You are on page 1of 15

CYBER ETHICS NOTES

• CYBER ETHICS:

The term "cyber ethics" refers to a set of moral rules or a


code of behavior applied to the online environment. As a
responsible netizen, you should observe these rules to help
make cyberspace a safe place.
Cyber ethics is made of two words cyber and ethics
where cyber is related to culture of computers and
information technology and ethics is defined as code of
morals practices by a person or group of people.

• COMPUTER ETHICS:

Computer ethics are a set of moral standards that govern


the use of computers. It is society's views about the use of
computers, both hardware and software. Privacy concerns,
intellectual property rights and effects on the society are
some of the common issues of computer ethics.

• E-COMMERCE:.

• E-Commerce or Electronic Commerce means buying and


selling of goods, products, or services over the internet. E-
commerce is also known as electronic commerce or internet
commerce. These services provided online over the internet
network. Transaction of money, funds, and data are also
considered as E-commerce. It is a modern way of doing
business using the internet. Almost anything can be
purchased through e-commerce today.
E commerce or electronic commerce can be classified into
four main categories. The four basic electronic commerce
models are as follows:
* Business to business
* Business to consumer
* Consumer to consumer
* Consumer to business
EXAMPLES OF E-COMMERCE: Amazon, Flipkart, eBay, Olx,
Quikr etc.

• ADVANTAGES OF E COMMERCE :

1. It is available 24*7 around the year.


2. It is easier to start and e-commerce venture as setup cost
are relatively low.
3. It offers better service to customers because distance is no
hindrance.
4. Customers can select a product from a wide range of
choices from different providers.
5. Process of buying and selling is relatively fast.
6. It greatly reduces the business running cost.
• DISADVANTAGES OF E-COMMERCE:

1. Anyone good or bad can easily start a business.


2. There is no guarantee of product quality.
3. Mechanical failures can cause unpredictable effects
on total processes.
4. There are many hackers over internet to look for
opportunities.
5. There is no way to experience a product before
purchase the luxury of touching and feeling the item
is taken away.
6. In case of physical goods, the customer has to wait to
receive their purchased items
7. E-Commerce is highly competitive.
8. Lack of privacy is a serious disadvantage of e-
commerce. Our customer has to provide the personal
details before making a purchase.

• PRIVACY:

Privacy is the protection of personal information given


online while carrying out some online activity or
transaction . In e-commerce specially it is related to a
company’s policy on the use of user data. The privacy of
users must be respected by ensuring that the data
collected this pay must not be used in public domain or
sold to responsible parties.
To respect the privacy The merchant of seller
must clearly state about how the use editor will be used
in the terms and condition of its site and implement
technical safeguards for the safety of the data provided
by user.

• PRIVACY POLICY PAGE:

A privacy policy page is a statement or a legal


document that states how a company or website
collects handles and processes data of its customers
and visitors it explicitly describes whether that
information is kept confidential or is shared with or sold
to third parties.
Almost all major websites have a privacy policy page
which informs the user what information will be
collected and how that information will be used.

• COOKIES:

Cookies are files that hold information about you, your


web browser and your on the internet. They are tiny
files stored on your PC or device which can be used by
the websites or web apps to tailor your online
experience.
Cookies are also used to deliver specific advertisements
to users based on their surfing habits.

• FRAUD: Fraud refers to any deceptive activity engaged


in by an individual with the aim of gaining something
through means that violate the law. One keyword in
fraud is deception, wherein the perpetrator leads their
victim to believe in an untruth in order to obtain a
benefit or value.
Fraud comes in many forms like:

1. Spyware: the term spyware refers to a software that


secretly gathers and transmits information about
using their computers and or their web browsing
habits. Spyware also ham a user's computer by
installing malicious software or changing the
computer settings in a manner that adversely affects
its performance.

2. Phishing:

It is a form of internet fraud that aims to trick


people into revealing sensitive information such
as their credit card numbers and passwords.
This is accomplished either through forged
emails appearing to have come from a genuine
source or through websites that claim and
appear to be well known organizations.

3. Email web bugs:


Web bugs are usually small images secretly
embedded in emails to gather information such
as the recipient’s IP address and the exact time
at which the email was read.

• . SECURITY OF INFORMATION:

Information security is a set of practices designed


to keep personal data secure from unauthorized
access and alteration during storing or
transmitting from one place to another.

• SECURE DATA TRANSMISSION:


Secure Data Transmission: is the transfer of data
over a secure channel using encryption and
decryption. Protocols such as SSL, SSH etc are used
for secure data transmission.
Requirements of secure data transmission are as
follows:
1. Privacy
2. Authentication of sender and recipient
3. Integrity and non- repudiation.
The two keys in a key pair are as follows:
One key is used to encrypt the data and other key is
used to decrypt the data.
1. Public key: It is distributed to any user who request
it.
2. Private key: Only the owner knows the private key.

3. SECURE SOCKET LAYER ( SSL):

SSL Stands for Secure Socket Layer.


It is a network security protocol that is used for
secure data transmission across a network. It
plays a very important role in the E-Commerce
activities on the web.

• ENCRYPTION:
It is the process of modifying data so that
unauthorised users cannot read it.

• DECRYPTION:
it is the process of converting encrypted data back
into the human readable form.

• DIGITAL CERTIFICATE:
A digital certificate is the kind of code or credential
that authenticates the identity of a server it is
signed by an independent recognised and mutually
trusted third party to ensure its validity the signer
of the digital certificate is known as a Certification
Authority (CA).
A digital certificate typically includes the following
information.
• Name of the owner it's email address and the URL
of the web server using the certificate.
• The owners public key.
• The name of the CA that issues the certificate.
• Serial number of the certificate
• The validity period of the certificate.
• Digital signature of the CA so that any tampering
with the content is easily detected.

• INTELLECTUAL PROPERTY RIGHTS:


Intellectual Property Rights (IPR): are exclusive rights
to an intellectual or a company to use its ideas,
design, invention etc. without the worry of
competition for a specific period.
• The four most popular intellectual property rights
are as follows:
• Patents: is an intellectual property right for a fixed
time-period, which gives an inventor the exclusive
right to exclude others from making, using, or
selling his/her invention.
• Copyrights: is an intellectual property right that
gives the creator of an original creative work the
exclusive right to determine whether and under
what conditions it may be copied and used by
others.
• Industrial Design Right: An industrial design right
is a legal right to identify and distinguished and
industrial object by way of appearance style or
design.
• Trade Secret: is an intellectual property right,
which consists of a secret technique used by a
company in manufacturing its products to gain
advantage over competitors.

. PLAGIARISM:

Plagiarism: is copying of another person's ideas


and other works while pretending that they are
one's
own.
Following are the ways to avoid plagiarism:
i. Paraphrase: is a way to express someone’s idea
in own words.
ii. Quoting: is a way in which a source is quoted
exactly in its original way but within “block
quotes”.
iii. Citing: is a way in which at the bottom of the
very page, details such as author’s name, date of
publication etc. are mentioned while using
someone’s work.
iv. Referencing: is a way in which at the end of the
document, details such as author’s name, date
of publication etc. are mentioned while using
someone’s work.

. DIGITAL PROPERTY RIGHTS:


Digital Property:
It refers to digital information such as database, internet
accounts, cloud storage etc.
Digital Property Rights:
It refers to rights that grant access and control of digital
information.
. Freedom of Information:
It refers to the right to privacy in the context of the
information technology. It is a recognised legal right as
per the Article 21 of Indian constitution
DIGITAL DIVIDE:
It is an uneven distribution in the access to and use of
information and communication technologies among various
groups. This technology may include the telephone, television,
personal computers and the Internet. The major factors that
are responsible for it are: (ccseid)
i. cost of technology,
ii. lack of skills,
iii. lack of education,
iv. lack of information,
v. access for the disabled, and
vi. low-performance computers.

SOFTWARE LICENCES:
It is a legal document that provides details regarding the use
and distribution of software. They either prohibit or provide
end users with the right to make copies of the software.
They are classified as proprietary/ closed source, open source
software and freeware/ free software.

Proprietary/ Closed Source Software (CSS): is paid software for


which the software publisher retains intellectual property
rights.
Open Source Software (OSS): is free software in which the
software publisher releases the source code under a license. It
grants permission to end users to redistribute them and make
modifications in the software.
Free Software/ Freeware: is software that is available for free,
but they are still considered closed source or proprietary
software because their source code is not available to the end
user to make any modifications.
Examples are Adobe Reader and Skype.

. OPEN SOURCE SOFTWARE MOVEMENT:


In 1983, RICHARD STALLMAN Launched the GNU project to
write a complete operating system .It is a movement in which
the source-code of software is released to programmers in
order to make voluntary modifications and its distribution. Such
movement lead to the development of MediaWiki software
through which Wikipedia website is built.

. OPEN SOURCE INITIATIVE:


Eric Raymond founded the open source initiative and non-
profit corporation to educate people about the benefits of
open source software.

. ANTIVIRUS SOFTWARE:
A program designed to detect or remove malicious programs
such as viruses ,worms and Trojan horses from a system.

.MALWARE:
A program designed to infiltrate and harm a computer without
the user’s consent.

.HACKER:
A person who gains unauthorized access to a computer system
for the purpose of fixing flaws within the system and for
improving security.

.CRACKER:
A person who gains unauthorized access to a computer system
for the purpose of stealing your corrupting data.

. PASSWORD:
A secret sequence of characters that enables a user to control
access to a computer program or a digital source.

.DIGITAL UNIFICATION:
It is an attempt to provide the same opportunities to all
sections of people to access information technology and the
knowledge to use it.

.NETIQUETTES:
Netiquettes is a set of rules for acceptable online behavior. It is
made by combining the words ‘network’ and ‘etiquette’.
Some of the netiquettes are mentioned as under:
(bpppceorstv)
i. Don’t backbite
ii. Don’t plagiarize
iii. Thank people who help you
iv. Verify facts before reposting
v. Don’t overuse the emotions
vi. Respect other people's privacy
vii. Don’t express offensive opinions
viii. Don’t type only in capital letters
ix. Don’t send unwanted spam messages
x. Check messages and respond promptly
xi. Don’t post private or embarrassing images or comments.
------------------------------------------------------------------------------------
--------

You might also like