Unit-3 Cyber Ethics
Unit-3 Cyber Ethics
Unit-3 Cyber Ethics
Chapter 6
Cyber ethics
Privacy- Privacy is the protection of personal information given online. In e-commerce especially, it is
related to a company’s policies on the use of user data.
Online Fraud- fraud committed using the internet is called online fraud. Online fraud may include
fraudulent payments, stealing financial information and identity theft etc.
Secure data transmission- it means applying in a technical safeguards so that data Travels safely to its
target without being compromised or eavesdropped.
Intellectual property rights- intellectual property rights are the rights of the owner of information to
decide how much information is to be exchanged ,shared or distributed. Also it gives the owner right to
decide the price for doing so.
Intellectual property rights are the legal rights that cover the privileges given to individuals who are the
owners and inventors of a work, and have created something with their intellectual creativity. Individuals
related to areas such as literature, music, invention, etc., can be granted such rights, which can then be used
in the business practices by them.
The creator/inventor gets exclusive rights against any misuse or use of work without his/her prior
information. However, the rights are granted for a limited period of time to maintain equilibrium. The
following list of activities which are covered by the intellectual property rights are laid down by the World
Intellectual Property Organisation (WIPO) –
Industrial designs
Scientific discoveries
Protection against unfair competition
Literary, artistic, and scientific works
Inventions in all fields of human endeavor
Performances of performing artists, phonograms, and broadcasts
Trademarks, service marks, commercial names, and designations
All other rights resulting from intellectual activity in the industrial, scientific, literary, or artistic
fields
Intellectual Property Rights can be further classified into the following categories
Plagiarism- Plagiarism is stealing someone else's intellectual work and representing it as your own
work without citing the source of information.
Any of the following act would be termed as Plagiarism
Using some other author’s work without giving credit to author.
Using someone else’s work in incorrect form than intended originally by the author/creator.
Modifying/lifting someone’s production such as music -composition etc. without attributing it to
the creator of the work.
Digital property: it refers to any information about you or why you that exists in digital form, either
online or on an electronic storage device.
Threats to digital properties:
1. Digital software penetration tools.
2. Stealing and plagiarizing codes of your digital properties.
Digital property right protection:
1. Anti-Temper Solutions.
2. Legal Clauses.
3. Limit the sharing of software code.
Software Licences : A software license agreement is a contract between the licensor or the author and the
purchaser of a piece of software which establishes the purchaser’s rights. It defines how that software can
be used and what happens in the event of breach
Free software- the software is freely accessible and can be freely used, improved ,copied and distributed
by all who wish to do so. and no payments are needed to made for free software.
Free software (also called freeware) is licensed at no cost, or for an optional fee. It is usually closed
source
A program is free software when the user has
• the freedom to run the program, for any purpose
• the freedom to access the source code and study how the program works
• the freedom to adapt it to user’s needs
• the freedom to redistribute copies
• the freedom to improve the program and release the improvements to the public, so that the whole
community benefits
Open source software OSS-Open source software is free and openly available to everyone. People who
create open source products publish the code and allow others to use and modify it. Communities of
programmers often work together to develop the software and to support users. Open source products are
usually tested in public by online contributors.
FLOSS- it refers to free Libre and open source software is used a software which is both free software as
well as open source software. here the word Libre means freedom.
GNU general public licence(GPL)- it is probably one of the most commonly used licence for open
source projects. it allows users to legally copy, tribute and modify software.
GNU lesser general public licence(LGPL)- the LGPL is used to licence free software so that it can be
operated and 2 both free software and proprietary software.
BSD license- BSD licence present a family of permissive you free software licences have fewer
restrictions on distribution compared to other free software licences.
MIT licence- the MIT licence is the shortest and probably broadest of all the popular open source
licences. it is the least open source licence.
Public domain software- it is free and can be used without restrictions.
Proprietary Software- it is neither free no available for public. there is a I sense attached to it. user has
to buy the licence in order to use it.
Proprietary software (sometimes referred to as closed source software) is software that legally
remains the property of the organisation, group, or individual who created it. The organisation that owns
the rights to the product usually does not release the source code, and may insist that only those who have
purchased a special licence key can use it.
Freedom of information- It refers to right to access information available on public platforms.
In India, Freedom of Information Act was implemented in 2002. The main principle behind
Freedom of Information legislation is that people have a right to know about the activities of public
authorities held by governments and government institutions. According to the Act, this information is in
principle public and may only be withheld for legitimate reasons.
According to this Act,
• Everybody has a right to access official information. Non-disclosure of information should be the
default.
• An applicant does not need to give you a reason for wanting the information. On the contrary, the
department must justify refusing them information.
• All the requests have to be treated equally.
Right to Information Act, 2005 (RTI) is a revolutionary Act under which, a common man can demand any
government agency to furnish information. The organisation is bound to provide the information, that too
within 30 days, failing which the officer concerned is slapped with a monetary fine.
Digital divide- It is an economic and social inequality with regard to access to, use of, on impact of
Information and Communication Technologies(ICT).
The Digital Divide, or the Digital Split, is a social issue referring to the differing amount of
information between those who have access to the Internet and those who do not have access. The term
became popular among concerned parties, such as scholars, policy makers, and advocacy groups, in the late
1990s.
Broadly speaking, the difference is not necessarily determined by the access to the Internet, but by
access to ICT (Information and Communications Technologies) and to Media that the different segments of
society can use. With regards to the Internet, the access is only one aspect, other factors such as the quality
of connection and related services should be considered. Today, the most discussed issue is the availability
of the access at an affordable cost and quality
NETIQUETTE:- “Netiquette” refers to Internet etiquette. This simply means the use of good manners in
online communication such as e-mail, forums, blogs, and social networking sites to name a few. It is
important to use netiquette because communication online is non-verbal.
(i) Accuracy of information: Misleading others is obviously a major breach of online etiquette. This is
true even if it’s unintentional. Check facts before providing information or giving advice. Provide sources.
If you’re not an expert on a topic, maybe you shouldn’t be acting like you are.
(ii) Use internet resources ethically: Online study resources should be used to support learning, not
replace it.
(iii) Promote healthy discussions: To get the most out of online forums, a useful netiquette guideline is to
promote healthy discussion. You can help your online community by posing questions, sharing experiences,
providing positive feedback, asking follow-up questions, and referring to information sources. Being a
positive contributor is better than being a critic, troll or other negative force.
(iv) Ignore inflammatory comments by trolls: It’s generally best to ignore trolls. These are internet users
who try to bait other users into a reaction.
(v) Respect others as equals: Show a little respect and humility online.
(vi) Remember, your words are permanent: Be careful with what you post online. Once it’s out there,
you may not be able to get it back.
(vii) Make your point in a nice way: Write in a way to get the kind of reaction you want. A little
thoughtfulness, strategy and netiquette can go a long way in online discussions.