Cyber Ethics Notes
Cyber Ethics Notes
2. Netiquettes: is a set of rules for acceptable online behavior. It is made by combining the words
i. Don’t backbite
3. Software Licenses: is legal document that provides details regarding the use and distribution
Of software. They either prohibit or provide end users with the right to make copies of the software.
They classified as proprietary/ closed source, open source software and freeware/ free software.
Proprietary/ Closed Source Software (CSS): is paid software for which the software publisher retains
Open Source Software (OSS): is free software in which the software publisher releases the source code
Under a license. It grants permission to end users to redistribute them and make modifications in the
Software.
Free Software/ Freeware: is software that is available for free, but they are still considered
Closed source or proprietary software because their source code is not available to the end user to make
Programmers in order to make voluntary modifications and its distribution. Such movement lead to the
5. Intellectual Property: refers to original works such as an idea, design, invention etc. created for
the
6. Intellectual Property Rights (IPR): are exclusive rights to an intellectual or company to use its
ideas,
Design, invention etc. without the worry of competition for a specific period.
i. Patents: is an intellectual property right for a fixed time-period, which gives an inventor the
Exclusive right to exclude others from making, using, or selling his/her invention.
ii. Copyrights: is an intellectual property right that gives the creator of an original creative work
The exclusive right to determine whether and under what conditions it may be copied and used
By others.
iv. Trade Secrets: is an intellectual property right, which consists of a secret technique used by
a
7. Plagiarism: is copying of another person’s ideas and other works while pretending that they are
one’s
Own.
ii. Quoting: is a way in which a source is quoted exactly in its original way but within “block
Quotes”.
iii. Citing: is a way in which at the bottom of the very page, details such as author’s name, date
of
8. Digital Property: refers to digital information such as database, internet accounts, cloud storage
etc.
9. Digital Property Rights: refers to rights that grant access and control of digital information.
10. Freedom of Information: refers to the right to privacy in the context of the information
technology. It
11. Digital Divide: is an uneven distribution in the access to and use of information and
communication
Technologies among various groups. This technology may include the telephone, television, personal
Computers and the Internet. The major factors that are responsible for it are: (ccseid)
i. Cost of technology,
12. E-Commerce: is an online service which involves range of activities such as creating a product,
It is the most important factor because it builds trust among users/ customers. During an
Online transaction, many personal details of customers such as credit/ debit card numbers,
Contact information, etc. are provided to the merchant company. Sometimes they sell it to other
Companies to make profits which may lead to cyber-crime against the user. Thus, it is
To do so, merchant companies use HTTPS/ SSL protocol along with firewall.
ii. Fraud: is an act of cheating user by various means to steal his wealth.
Online/ Internet fraud are acts of cheating committed using internet and may involve providing
Fake information, false information, incomplete information to lure users into spending their
Wealth into scams. Some examples are charity fraud, online ticket fraud, online gambling fraud,
iii. Secure Data Transmission: is the transfer of data over a secure channel using encrypting
Protocols such as SSL, SSH etc. It mainly depends on data encryption which makes the data
Data Encryption is the process of encoding data or information so that only authorized person
With the secret key can use it. In case when the data is stolen by an unauthorized person, the
Data becomes useless as it is encoded and can’t be accessed without the secret key.