This document discusses various ethics and safety measures related to computing. It defines computer ethics as moral standards governing computer use. Some key ethical guidelines discussed include respecting privacy, using original software, and communicating respectfully online. The document also summarizes the "Ten Commandments of Computer Ethics" which establish standards for ethical computer use. Additionally, it discusses concepts like plagiarism, spamming, phishing, hacking, cyberbullying and provides tips to prevent unethical practices and protect privacy and intellectual property online. Finally, the document outlines various safety measures one should take like using antivirus software, strong passwords, backups, firewalls and being cautious of emails/links from unknown sources.
2. COMPUTER ETHICS
Computer ethics are a set of moral standards
that govern the use of computers. It is
society’s views about the use of computers
of both hardware and software.
Some of them are -
• Respect the privacy of others on the Internet
and never access their information without
their permission.
• Posting wrong or unethical information on the
Internet can harm others.
• Always use original software.
• Be respectful while communicating with
others on Internet.
3. The Ten Commandments of Computer Ethics
The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute.[1] The
commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by
Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of
computers."
They are as follows -
1) One should not use a computer to harm other people.
2) One should not interfere with other people's computer work.
3) One should not snoop around in other people's computer files.
4) One should not use a computer to steal.
5) One should not use a computer to bear false witness.
6) One should not copy or use proprietary software for which you have not paid (without permission).
7) One should not use other people's computer resources without authorization or proper compensation.
8) One should not appropriate other people's intellectual output.
9) One should think about the social consequences of the program you are writing or the system you are
designing.
10) One should always use a computer in ways that ensure consideration and respect for other humans.
5. PLAGIARISM
Plagiarism is an act of presenting
someone’s work, ideas, thoughts or
creativity as your own, with or
without their permission. Even
accidentally using another’s ideas or
words without proper citation, due
to carelessness, falls under
plagiarism.
It is considered as Cyber-Crime and is
a punishable act.
• Take permission of the author whose contents
you are using.
• Write the content in your own language.
• Always acknowledge the source from where
the content is taken.
• Put cotents in quotes.
PREVENTING PLAGIARISM
6. SPAMMING
Spam is any kind of unwanted,
unsolicited digital communication,
often an email, that gets sent out
in bulk.
They exhaust the storage space
and make it difficult for us to find
important mails received.
It is also known as mail bombing.
• Never provide your email address
unnecessarily anywhere.
• Never open or reply to spam messages.
• Use Spam filtering tools.
PREVENTING SPAMMING
7. PHISHING
Phishing is a cyber attack that
uses disguised emails, phone calls
or messages as a weapon. The
goal is to trick the recipient into
believing that the message is
something they want or need — a
request from their bank or to click
a link or download an attachment
so to get account details,
passwords etc. • Never access a bank's website from the
link provided.
• Never respond to unknown emails
received.
• Never share your credentials to anyone.
PREVENTING PHISHING
8. HACKING
Hacking means gaining the access to a
remote computer to control its
information without any authorisation
from the owner.
Computer hackers are unauthorized
users who break into computer
systems in order to steal, change or
destroy information, often by
installing dangerous malware without
your knowledge or consent.
• Always keep an up-to-date antivirus
software in your system.
• Never download pirated software.
• Never share your passwords and
frequently change them.
PREVENTING HACKING
9. CYBERBULLYING
Cyberbullying is the use of technology
to intimidate, harass, threaten,
torment, or humiliate a target via
social media, email, messaging apps,
text messages, forums, games, and
more.
Examples of cyberbullying including
sending mean texts, posting false
information about a person online, or
sharing embarrassing photos or videos.
• While using social media, check the
privacy settings and keep them accessible
to known people only.
• Never share your information or photos
publically on Internet.
PREVENTING CYBERBULLYNG
10. RIGHT TO PRIVACY
Right to Privacy is an individual's fundamental right to
keep his/her personal information secret from others and
reveal only selective information. Accessing search
information without the consent of the owner is unethical
and illegal.
Protecting Privacy -
• Never Share your Account details like ID or passwords
with others.
• Avoid keeping any confidential information in your
system and delete it, if it is no longer required.
• Cookies stored in your system by other websites cause
leakage of information. Delete them on regualar basis.
11. INTELLECTUAL PROPERTY RIGHT
Intellectual property Right (IPR) is the product of the
human intellect including creativity concepts, inventions,
industrial models, trademarks, songs, literature, symbols,
names, brands,....etc. Intellectual Property Rights do not
differ from other property rights. They allow their owner
to completely benefit from his/her product which was
initially an idea that developed and crystallized. They also
entitle him/her to prevent others from using, dealing or
tampering with his/her product without prior permission
from him/her.
12. DIGITAL FOOTPRINTS
A digital footprint is a trail of data you create while using the
Internet. It includes the websites you visit, emails you send, and
information you submit to online services.
There are two types of digital footprints -
1. A "passive digital footprint" is a data trail you unintentionally
leave online. For example, when you visit a website, the
web server may log your IP address, which identifies your
Internet service provider and your approximate location.
2. An "active digital footprint" includes data that you
intentionally submit online. Sending an email contributes to
your active digital footprint, since you expect the data be seen
and/or saved by another person.
13. SAFETY MEASURES
• Install protected software: Install protected (Antivirus) software and set it to scan your
files and folders for viruses on a regular basis.
• Choose Strong Password: Use a combiantion of letters, numbers and special characters to
create a strong password. Create a different password for each important account and update it
regualarly.
• Back up on regular basis: Make a practise to take regualr back ups of the important data
• Control Access to your machine: Do not leave your computer unattended or locked on,
especially at public places.
• Use e-mail and Internet safety: Do not open the e-mail with an attachment or link from
the people you don't know.
• Protect sensitive data: Remove all the sensitive data files from the hard disks especially
when recycling or repurposing your computer.
• Use Firewall: Firewall is the easiest way to safeguard your computer from being accessed by
a burglar, especially via Internet.