Computer Ethics Computer Ethics is a part of practical philosophy, which deals with how computing professionals should make decisions regarding professional and social conduct.
The concept originated in 1950 by Norbert Wiener.
Later by 1970, a medical practitioner and researcher called Walter
Manner observed that ethical decisions are much harder to make in the context of computer. He then formally introduced Computer Ethics as a separate branch of study. Computer Ethics to be followed • Generating / consciously spreading computer viruses is unethical • Computer should not be used to dehumanize individual • Text document on the net may be protected by encryption • It should not be used for robbery or to steal money from somebody else’s account • One should not snoop around in other people’s files • The internet can spread untruth and false information • Hacking is unethical Cyber Crime • It refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime. The other word is net crime. It includes cracking, encroachment of one’s privacy, interception of confidential news and etc. It targets computer networks / devices: Examples: • Viruses & Malware • Phishing: Attempt to acquire sensitive information such as usernames, passwords and credit card details (masquerading a trustworthy identity) • Spam: Unsolicited sending of bulk emails for commercial purposes • Cyber Bullying: to use Cyber Technology to harass other people deliberately Cyberspace Cyberspace is the rapidly growing network of computing and communication technologies that have profoundly altered our lives. We carry out myriad social, economic and political transactions through Cyberspace. But the very technology that enables these transactions also makes detailed, cumulative and invisible observation of our selves. The continuous surveillance of all our cyber activities present a serious threat to information privacy. Cyberspace Technology can enhance individual freedom through increased anonymity and privacy. At the same time, the users of new technologies have employed themselves to violate autonomy and human dignity of other users. Often women are the target of these people.