SlideShare a Scribd company logo
1 of 14
COMPUTER APPLICATIONS
CLASS X (Code 165)
TOPIC:
UNIT 3: Cyber Ethics
By
HIMANSHU PATHAK
Contents
ā€¢ Introduction
ā€¢ Cyber Ethics
ā€¢ Netiquettes
ā€¢ Rules of Netiquettes
ā€¢ Software Licenses
ā€“ Closed Source Software
ā€“ Open-source Software
ā€“ Free Software
Introduction
ā€¢ Ethics is the classic sense refers to the rules and
standards governing the conduct of an individual
with others.
ā€¢ Need: In order to keep the healthy environment in
computer room, to make good relation with the co-
workers and to improve the working efficiency, some
basic ethics are necessary.
ā€¢ Computer ethics is a concept in ethics that addresses
the ethical issues and constraints that arise from the
use of computers, and how they can be prevented.
Cyber Ethics
ā€¢ Cyber means electronic communication
networks.
ā€¢ Ethics is a system of moral principles.
ā€¢ Cyber ethics is the study of ethics pertaining to
computers, covering user behavior and what
computers are programmed to do.
ā€¢ In other way, Cyber Ethics is the conduct of
acceptable usage of online resources by a user.
Contā€¦
ā€¢ The main issues that surround cyber ethics are:
Copyright/Downloading, Hacking and Cyber bullying.
ā€¢ These three issues are increasing daily and mostly
due to children using the internet improperly.
ā€¢ Copyright/Downloading has become a major
problem which allow users to download music,
programs and videos for free.
ā€¢ Hacking is the intentional damage that a person
inflicts onto another computer or computer network.
ā€¢ Cyber bullying is bullying that takes place carrying
electronic technology.
Netiquettes
ā€¢ Netiquettes is a set of rules for acceptable online
behavior.
ā€¢ It is made by combining the words ā€˜networkā€™ and
ā€˜etiquetteā€™, thus it is also known as Internet
Etiquette.
ā€¢ It means the use of good manners in online
communication such as e-mails, forums, blogs and
social networking sites etc.
ā€¢ In other words, Netiquettes means, we should
be ethical, respectful and responsible while surfing
the Internet.
Contā€¦
ā€¢ Ethical means we should share our information and
expertise online without any copyright violations.
ā€¢ We need to be responsible means we should not
indulge in any insulting, degrading or intimidating
online behavior which is Cyber Bullying.
ā€¢ We should not encourage trolls by giving attention
to them.
ā€¢ Respectful means we should respect other peopleā€™s
privacy and the freedom of personal expression.
Rules of Netiquette
ā€¢ Some of the netiquettes are mentioned as under:
ā€“ Donā€™t backbite
ā€“ Donā€™t plagiarize
ā€“ Thank people who help you
ā€“ Verify facts before reposting
ā€“ Donā€™t overuse the emotions
ā€“ Respect other people's privacy
ā€“ Donā€™t express offensive opinions
ā€“ Donā€™t type only in capital letters
ā€“ Donā€™t send unwanted spam messages
ā€“ Check messages and respond promptly
ā€“ Donā€™t post private or embarrassing images or comments
Software Licenses
ā€¢ License is permission granted by the holder of a
copyright to another to use an original work.
ā€¢ A software license is a document that provides
details regarding the use and distribution of
software.
ā€¢ They either prohibit or provide end users with
the right to make copies of the software.
ā€¢ They classified as proprietary/ closed source,
open source software and freeware/ free
software.
Proprietary/ Closed Source Software
ā€¢ Proprietary software, you need to purchase the license
and features are unlocked only after you purchase the
software.
ā€¢ Proprietary software remains the property of its
owner/creator and is used by end-users / organizations
under predefined conditions.
ā€¢ Proprietary software may also be called closed-source
software or commercial software.
ā€¢ It is paid software for which the software publisher retains
intellectual property rights.
ā€¢ Some examples of Proprietary software includes
Windows, MacOS, Internet Explorer, Google earth,
Microsoft Office etc.
Open-source Software
ā€¢ The term Open Source refers to software in which
the source code is freely available for others to view,
amend, and adapt.
ā€¢ It is free software in which the software publisher
releases the source code under a license.
ā€¢ It grants permission to end users to redistribute
them and make modifications in the software.
ā€¢ Some examples of Open source software includes
Android, Ubuntu, Firefox, Open Office etc.
Freeware/Free Software
ā€¢ It is software that is available for free, but they are
still considered closed source or proprietary
software because their source code is not available
to the end user to make any modifications.
ā€¢ Shareware is where the software is free only for
specified period, on only few features are available
for free. E.g. WinZip or MySQL.
ā€¢ Then we have Freeware. These are software where
all features are available free for life. E.g. Yahoo
Messenger or Adobe PDF.
Open Source Software Movement
ā€¢ The open-source-software movement is a
movement that supports the use of open-source
licenses for some or all software, a part of the
broader notion of open collaboration.
ā€¢ It is a movement in which the source-code of
software is released to programmers in order to
make voluntary modifications and its distribution.
ā€¢ Such movement lead to the development of
MediaWiki software through which Wikipedia
website is built.
Summary
ā€¢ Cyber Ethics and Netiquettes.
ā€¢ Software Licenses and their categories.
ā€¢ In the next class, we will start Unit III ā€“ Cyber
Ethics: part 2 in detail.
ā€¢Thanks

More Related Content

What's hot

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
Ā 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
Ā 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
Ā 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impactsBeing Aabis
Ā 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
Ā 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsKodok Ngorex
Ā 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsshashi kiran
Ā 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethicsDr. TJ Wolfe
Ā 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT ProfessionalsProf. Erwin Globio
Ā 
Internet Services
Internet Services Internet Services
Internet Services GLG
Ā 

What's hot (20)

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
Ā 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Ā 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Ā 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Ā 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impacts
Ā 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Ā 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
Ā 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
Ā 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
Ā 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
Ā 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ā 
computer ethics
computer ethicscomputer ethics
computer ethics
Ā 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Ā 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
Ā 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Ā 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
Ā 
Internet Services
Internet Services Internet Services
Internet Services
Ā 

Similar to An Introduction to Cyber Ethics

Society law & ethics.pdf
Society law & ethics.pdfSociety law & ethics.pdf
Society law & ethics.pdfAditya901507
Ā 
SFO15-TR1: The Philosophy of Open Source Development
SFO15-TR1: The Philosophy of Open Source DevelopmentSFO15-TR1: The Philosophy of Open Source Development
SFO15-TR1: The Philosophy of Open Source DevelopmentLinaro
Ā 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
Ā 
Open source . . . Open Road
Open source . . . Open RoadOpen source . . . Open Road
Open source . . . Open RoadMazen Elsayed
Ā 
Software Freedom Licensing: What You Must Know
Software Freedom Licensing: What You Must KnowSoftware Freedom Licensing: What You Must Know
Software Freedom Licensing: What You Must KnowPOSSCON
Ā 
How to get started in Open Source!
How to get started in Open Source!How to get started in Open Source!
How to get started in Open Source!Pradeep Singh
Ā 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptxMuruganS82
Ā 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdfManyaThakur12
Ā 
Open soucre(cut shrt)
Open soucre(cut shrt)Open soucre(cut shrt)
Open soucre(cut shrt)Shivani Rai
Ā 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software DevelopmentJane Prusakova
Ā 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
Ā 
Chalk Talk! Open: source, access, education, research, minds
Chalk Talk! Open: source, access, education, research, mindsChalk Talk! Open: source, access, education, research, minds
Chalk Talk! Open: source, access, education, research, mindsIrina Zaks
Ā 
#speakgeek - Open Source Software Infrastructure at iconnect360
#speakgeek - Open Source Software Infrastructure at iconnect360#speakgeek - Open Source Software Infrastructure at iconnect360
#speakgeek - Open Source Software Infrastructure at iconnect360Derek Chan
Ā 

Similar to An Introduction to Cyber Ethics (20)

INTERNT.ppt
INTERNT.pptINTERNT.ppt
INTERNT.ppt
Ā 
Society law & ethics.pdf
Society law & ethics.pdfSociety law & ethics.pdf
Society law & ethics.pdf
Ā 
SFO15-TR1: The Philosophy of Open Source Development
SFO15-TR1: The Philosophy of Open Source DevelopmentSFO15-TR1: The Philosophy of Open Source Development
SFO15-TR1: The Philosophy of Open Source Development
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Ā 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
Ā 
LINUX BASICS
LINUX BASICSLINUX BASICS
LINUX BASICS
Ā 
Open source . . . Open Road
Open source . . . Open RoadOpen source . . . Open Road
Open source . . . Open Road
Ā 
Software Freedom Licensing: What You Must Know
Software Freedom Licensing: What You Must KnowSoftware Freedom Licensing: What You Must Know
Software Freedom Licensing: What You Must Know
Ā 
How to get started in Open Source!
How to get started in Open Source!How to get started in Open Source!
How to get started in Open Source!
Ā 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
Ā 
Online ethics
Online ethicsOnline ethics
Online ethics
Ā 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdf
Ā 
Shak taha
Shak tahaShak taha
Shak taha
Ā 
Open soucre(cut shrt)
Open soucre(cut shrt)Open soucre(cut shrt)
Open soucre(cut shrt)
Ā 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software Development
Ā 
Nfwordle
NfwordleNfwordle
Nfwordle
Ā 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
Ā 
Chalk Talk! Open: source, access, education, research, minds
Chalk Talk! Open: source, access, education, research, mindsChalk Talk! Open: source, access, education, research, minds
Chalk Talk! Open: source, access, education, research, minds
Ā 
#speakgeek - Open Source Software Infrastructure at iconnect360
#speakgeek - Open Source Software Infrastructure at iconnect360#speakgeek - Open Source Software Infrastructure at iconnect360
#speakgeek - Open Source Software Infrastructure at iconnect360
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Ā 

More from Himanshu Pathak

Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerceHimanshu Pathak
Ā 
Digital property rights
Digital property rightsDigital property rights
Digital property rightsHimanshu Pathak
Ā 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsHimanshu Pathak
Ā 
Cascading style sheet part 2
Cascading style sheet   part 2Cascading style sheet   part 2
Cascading style sheet part 2Himanshu Pathak
Ā 
Cascading style sheet an introduction
Cascading style sheet   an introductionCascading style sheet   an introduction
Cascading style sheet an introductionHimanshu Pathak
Ā 
Html link and list tags
Html link and list tagsHtml link and list tags
Html link and list tagsHimanshu Pathak
Ā 
HTML Text formatting tags
HTML Text formatting tagsHTML Text formatting tags
HTML Text formatting tagsHimanshu Pathak
Ā 
Introduction to html
Introduction to htmlIntroduction to html
Introduction to htmlHimanshu Pathak
Ā 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologiesHimanshu Pathak
Ā 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsHimanshu Pathak
Ā 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetHimanshu Pathak
Ā 

More from Himanshu Pathak (18)

Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
Ā 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
Ā 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
Ā 
Cascading style sheet part 2
Cascading style sheet   part 2Cascading style sheet   part 2
Cascading style sheet part 2
Ā 
Cascading style sheet an introduction
Cascading style sheet   an introductionCascading style sheet   an introduction
Cascading style sheet an introduction
Ā 
Html multimedia
Html multimediaHtml multimedia
Html multimedia
Ā 
Html forms
Html formsHtml forms
Html forms
Ā 
Html tables
Html tablesHtml tables
Html tables
Ā 
Html link and list tags
Html link and list tagsHtml link and list tags
Html link and list tags
Ā 
HTML Text formatting tags
HTML Text formatting tagsHTML Text formatting tags
HTML Text formatting tags
Ā 
Basic html tags
Basic html tagsBasic html tags
Basic html tags
Ā 
Introduction to html
Introduction to htmlIntroduction to html
Introduction to html
Ā 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologies
Ā 
Web services
Web servicesWeb services
Web services
Ā 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
Ā 
Internet protocol
Internet protocolInternet protocol
Internet protocol
Ā 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Ā 
What is Computer?
What is Computer?What is Computer?
What is Computer?
Ā 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Ā 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
Ā 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
Ā 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
Ā 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
Ā 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
Ā 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
Ā 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdfssuser54595a
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
Ā 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)Dr. Mazin Mohamed alkathiri
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
Ā 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
Ā 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
Ā 
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
Ā 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Ā 
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
Ā 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
Ā 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
Ā 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Ā 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
Ā 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
Ā 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
Ā 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Ā 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Ā 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
Ā 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
Ā 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Ā 
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Ā 

An Introduction to Cyber Ethics

  • 1. COMPUTER APPLICATIONS CLASS X (Code 165) TOPIC: UNIT 3: Cyber Ethics By HIMANSHU PATHAK
  • 2. Contents ā€¢ Introduction ā€¢ Cyber Ethics ā€¢ Netiquettes ā€¢ Rules of Netiquettes ā€¢ Software Licenses ā€“ Closed Source Software ā€“ Open-source Software ā€“ Free Software
  • 3. Introduction ā€¢ Ethics is the classic sense refers to the rules and standards governing the conduct of an individual with others. ā€¢ Need: In order to keep the healthy environment in computer room, to make good relation with the co- workers and to improve the working efficiency, some basic ethics are necessary. ā€¢ Computer ethics is a concept in ethics that addresses the ethical issues and constraints that arise from the use of computers, and how they can be prevented.
  • 4. Cyber Ethics ā€¢ Cyber means electronic communication networks. ā€¢ Ethics is a system of moral principles. ā€¢ Cyber ethics is the study of ethics pertaining to computers, covering user behavior and what computers are programmed to do. ā€¢ In other way, Cyber Ethics is the conduct of acceptable usage of online resources by a user.
  • 5. Contā€¦ ā€¢ The main issues that surround cyber ethics are: Copyright/Downloading, Hacking and Cyber bullying. ā€¢ These three issues are increasing daily and mostly due to children using the internet improperly. ā€¢ Copyright/Downloading has become a major problem which allow users to download music, programs and videos for free. ā€¢ Hacking is the intentional damage that a person inflicts onto another computer or computer network. ā€¢ Cyber bullying is bullying that takes place carrying electronic technology.
  • 6. Netiquettes ā€¢ Netiquettes is a set of rules for acceptable online behavior. ā€¢ It is made by combining the words ā€˜networkā€™ and ā€˜etiquetteā€™, thus it is also known as Internet Etiquette. ā€¢ It means the use of good manners in online communication such as e-mails, forums, blogs and social networking sites etc. ā€¢ In other words, Netiquettes means, we should be ethical, respectful and responsible while surfing the Internet.
  • 7. Contā€¦ ā€¢ Ethical means we should share our information and expertise online without any copyright violations. ā€¢ We need to be responsible means we should not indulge in any insulting, degrading or intimidating online behavior which is Cyber Bullying. ā€¢ We should not encourage trolls by giving attention to them. ā€¢ Respectful means we should respect other peopleā€™s privacy and the freedom of personal expression.
  • 8. Rules of Netiquette ā€¢ Some of the netiquettes are mentioned as under: ā€“ Donā€™t backbite ā€“ Donā€™t plagiarize ā€“ Thank people who help you ā€“ Verify facts before reposting ā€“ Donā€™t overuse the emotions ā€“ Respect other people's privacy ā€“ Donā€™t express offensive opinions ā€“ Donā€™t type only in capital letters ā€“ Donā€™t send unwanted spam messages ā€“ Check messages and respond promptly ā€“ Donā€™t post private or embarrassing images or comments
  • 9. Software Licenses ā€¢ License is permission granted by the holder of a copyright to another to use an original work. ā€¢ A software license is a document that provides details regarding the use and distribution of software. ā€¢ They either prohibit or provide end users with the right to make copies of the software. ā€¢ They classified as proprietary/ closed source, open source software and freeware/ free software.
  • 10. Proprietary/ Closed Source Software ā€¢ Proprietary software, you need to purchase the license and features are unlocked only after you purchase the software. ā€¢ Proprietary software remains the property of its owner/creator and is used by end-users / organizations under predefined conditions. ā€¢ Proprietary software may also be called closed-source software or commercial software. ā€¢ It is paid software for which the software publisher retains intellectual property rights. ā€¢ Some examples of Proprietary software includes Windows, MacOS, Internet Explorer, Google earth, Microsoft Office etc.
  • 11. Open-source Software ā€¢ The term Open Source refers to software in which the source code is freely available for others to view, amend, and adapt. ā€¢ It is free software in which the software publisher releases the source code under a license. ā€¢ It grants permission to end users to redistribute them and make modifications in the software. ā€¢ Some examples of Open source software includes Android, Ubuntu, Firefox, Open Office etc.
  • 12. Freeware/Free Software ā€¢ It is software that is available for free, but they are still considered closed source or proprietary software because their source code is not available to the end user to make any modifications. ā€¢ Shareware is where the software is free only for specified period, on only few features are available for free. E.g. WinZip or MySQL. ā€¢ Then we have Freeware. These are software where all features are available free for life. E.g. Yahoo Messenger or Adobe PDF.
  • 13. Open Source Software Movement ā€¢ The open-source-software movement is a movement that supports the use of open-source licenses for some or all software, a part of the broader notion of open collaboration. ā€¢ It is a movement in which the source-code of software is released to programmers in order to make voluntary modifications and its distribution. ā€¢ Such movement lead to the development of MediaWiki software through which Wikipedia website is built.
  • 14. Summary ā€¢ Cyber Ethics and Netiquettes. ā€¢ Software Licenses and their categories. ā€¢ In the next class, we will start Unit III ā€“ Cyber Ethics: part 2 in detail. ā€¢Thanks