0% found this document useful (0 votes)
241 views

Computer Ethics Research

The document discusses various topics related to computer ethics including software piracy, cybercrimes, cyberbullying, and data privacy. Software piracy involves illegally copying or distributing copyrighted software and can harm users. Cybercrimes are illegal acts that use technology to steal information or harm systems. Cyberbullying involves harassing others online through messages, images or videos.

Uploaded by

Alana Narine
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
241 views

Computer Ethics Research

The document discusses various topics related to computer ethics including software piracy, cybercrimes, cyberbullying, and data privacy. Software piracy involves illegally copying or distributing copyrighted software and can harm users. Cybercrimes are illegal acts that use technology to steal information or harm systems. Cyberbullying involves harassing others online through messages, images or videos.

Uploaded by

Alana Narine
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

💻

Computer Ethics & Research

💡 Objectives:

Explain the terms software piracy, counterfeiting, softlifting, hard disk loading and peer to
peer sharing.

Explain terms related to and methods of dealing with unethical behaviors such as trolling,
cyberbullying, phishing, hacking, internet fraud and prohibited, offensive and illegal
content.

Explain the term 'malware' and ways of dealing with malware.

Software Piracy:
A common copyright infringement is software piracy. Software piracy is the unauthorized
copying, use or selling of copyrighted software.
The main reason of software piracy is that its an infringement of ownership rights. It is the theft
of the work and effort of another individual or company. The owner loses potential revenue.
Reasons for using pirated software includes:

Pirated software may not contain all the elements and documentaries of the original
program, causing problems for the user.

Pirated software may not have the upgrade options often provided as an add-on, in
legitimate software.

Pirated software may have viruses that can be harmful to your hard drive or network.

All software is copyrighted, as the person or company who wrote it always retains the right to
decide whether or not it can be copied. However, is it not always illegal to copy and distribute
software. For example public doman software can be copied as many times.

Computer Ethics & Research 1


Types Of Software Piracy:

💡 Softlifting (softloading or end-user privacy):

The price of a new computer from a reputable company, usually also includes the cost of the
copyrighted software present on that specific machine. Therefore, a private purchaser of a
computer buys both the computer and a single -user license for the software on that machine.
Softlifting occurs when this licensed end-user makes copies of the machine's software and
distributes or sells it to other individuals or companies.

💡 Hard Disk Loading:

This form of commercial software piracy occurs when system builders purchase a legal copy of
software and then copy or install the software onto other computer hard disks. These hard disks
containing the pre-installed illegally copied software are then installed in computers and sold.

💡 Peer To Peer File Sharing (p2p):

This method of file sharing allows normal users to connect directly to other users to share files.
Software piracy occurs when users share copyrighted works that they do not have the right to
share. However, it is important to remember that peer-to-peer is not anonymous, not secret and
can be unsafe.

💡 Internet Piracy:

Some websites allow individuals to download unauthorized copies of software.

💡 Counterfeiting:

Computer Ethics & Research 2


This occurs when individuals or companies make illegal copies of software and package it to
look like the original packaging from the manufacturer.

What’s Wrong With Software Piracy?


The main answer is that it is an infringement of ownership rights. It is the theft of the work and
effort of another individual or company. The owner loses potential revenue as a result of piracy.
Pirated software is therefore simply theft and using it is morally wrong. Other reasons include:

Pirated software may not contain all the elements and documentaries of the original
program, causing problems for the user.

Pirated software may not have the upgrade options often provided as an oadd-on in
legitimate software.

Pirated software may have viruses that can be harmful to your hard-drive or network.

Pirated software is simply illegal - most countries have laws against software piracy. Individuals
convicted of this crime can play heft fines or even be jailed.

All software is copyrighted, as the person or company who wrote it always retain the right to
decide whether or not it can be copied. However, it is not illegal to copy and distribute this
software.

For example, open-source software (OSS) is software that s distributed with source code that is
released under a license in which the copyright holder grants users the rights to modify and
distribute the software to anyone and for any purpose. The modified versions may also be
redistributed.

For example. public domain software can be copied as many times as you like. Software is in the
public domain when it is put on websites for free distribution, with the consent of the copyright
owner. One popular domain program is Adobe, Reader, available from www.adobe.com
There is also freeware software available at specialist, websites such as NiniteWOT and
softpediaWOT. Once again this software is copyrighted, but you are not allowed to copy it for
personal use. In this case, the owners distribute it for free out of spirit of cooperation, or perhaps
to promote themselves as software writers.

Importance Of Data Piracy:


Many businesses, government bodies and other organizations hold information on individuals.
Information given to these bodies is given for a specific reason. In many cases the information is

Computer Ethics & Research 3


personal to the individual and can be valuable to any number of organizations, not least
commercial organizations that want to approach you directly to offer a product or service.
The ease with which data stored on databases can be accessed, cross-referenced and transmitted
from one computer to the next in a local area(LAN), wide area network(WAN) or over the
internet, emphasizes the need for data piracy laws.

Unethical Behavior On The Internet:

💡 Cybercrimes:

Cybercrime is an issue that has an impact on the lives of many people, businesses and
organizations around the world. Cybercrimes are crimes directed at computers or other devices,
and where computers or other devices are integral to the offence. Cybercriminals are individuals
or teams of people who use technology to commit malicious activities on digital systems or
network in order to steal sensitive company info or personal data and make a profit. Common
cybercrimes include:

Hacking

Cyberbullying, cyberstalking & online cruelty

Online scams & fraud

Identity theft

Attacks on computer systems

Illegal or prohibited online content.

The effect of cybercrime can be extremely upsetting. Victims may feel that their privacy has
been violated and that they are powerless. Unfortunately as the reliance on technology grows
worldwide, the cost and incidence of cyber crime is expected to increase. Therefore, to protect
organizations & individuals, governments around the world have passed or are working on laws
to deal with cyber crimes.

Cyberbullying, Cyberstalking & Online Cruelty


Cyberbullying, cyberstalking and online cruelty occurs when people behave in offensive,
menacing or harassing ways towards others using electronic means. Online methods may include

Computer Ethics & Research 4


emails, instant messages, tweets and blogs. Although these forms of cybercrime have become
increasingly common among teenagers.

The main difference between cyberbullying and cyberstalking is one of age. If adults are
involved, the act is usually called cyberstalking. While among children, it is usually referred to
as cyberbullying. Examples that can occur include:

Posting hurtful messages, images or videos online

Repeatedly sending unwanted messages online

Excluding or intimidating other online

Creating fake social networking profiles or websites that are hurtful

Posting nasty gossip and chat online

Gathering and posting personal information on an individual

Spreading false rumors about an individual and encouraging others to join in the harassment

Sending devious, threatening, vulgar or harassing emails from a variety of email accounts

Hacking into an individual's online banking or email accounts and changing that person's
setting or passwords.

💡 Terms Associated With Cyberbullying:

Target: A person who is the object of a deliberate action

Offender: A person who wants to hurt someone in a nasty way

Bystander: A person who does nothing when they witness cyberbullying happening

Upstander: A person who does something when cyberbullying occurs

Escalate: To increase or make more intense

De-escalate: To decrease or make less intense

How To Deal With Cyberbullying


Cyberbullying can cause extreme distress for the victim. It can affect their quality of life due to
the constant fear of being harassed, watched or followed. Although cyberbullying is against the

Computer Ethics & Research 5


law in many countries, it is difficult to combat because the bully is usually anonymous and
difficult to track down. Steps to prevent or deal with cyberbullying:

Suspend social networking accounts until cyberbullying stops.

Adjust your privacy settings on your social networking sites if you wish to continue to use
these sites.

Always use strong passwords, or two-factor authentication.

Avoid posting you location or related information.

Trolling
An internet troll is a person who deliberately posts abusive or derogatory online comments to
social media websites to provoke reactions from readers. Responding, usually makes their
abusive behavior worse. The extent to which trolls participate in negative behavior can range
from annoyance to extreme cruelty.

How To Deal With Trolls


Tips on how to deal with trolls include:

Establish a detailed policy for user comments to specify the kind of comments that are
allowed on your website and social media posts.

Ignore comments made by trolls.

Use humor as a response.

Reveal the troll's identity.

Fight back with facts.

Prohibited, Offensive & Illegal Content


Illegal & offensive content can be found almost anywhere online. Many sites also show live
visual and audio content. One of the major risks of illegal & prohibited content is that it may
reach children, for whom such content can be especially damaging. Keep the internet safe for all
users by always reporting prohibited content. The following types of content can be classified as
prohibited, offensive & illegal:

Child pornography or child abuse

Sexting

Computer Ethics & Research 6


Content that shows sexual violence or materials that are very violent

Content the provokes the viewer into committing crimes and carrying out violent acts

Content that promotes terrorism or encourages terrorist acts

Malware
Malware is a term used to describe different types of malicious software which include viruses,
worms, spyware, ransomware, Trojans and bots. Criminals may use malware to monitor your
online activity and damage your computer.
Malware is often downloaded when someone opens an infected email attachment or clicks on a
suspicious link in an email. Malware can also be used to steal your username, password or other
information, which is then sent to third party.

How Malware Is Spread


Malware is usually spread by:

Downloading infected programs and files by mistake from the internet

Opening infected files received through emails

Opening unwanted attachments or embedded links in electronic mail

Using a storage medium such as USB drive or CD that contains infected files

Self-propagating, which is the ability of malware to remove itself, therefore spreading on its
own.

How To Prevent & Protect Against Viruses


You need to be continually aware of the possibility of malware entering your computer system.
Some of the signs that may indicate that your system has malware are:

Weird or obscene messages

Garbled information

Incorrect document contents

Missing files & folders

Applications crashing or hanging when opening documents

Computer Ethics & Research 7


Phishing
Phishing refers to attempts by cybercriminals and hackers to trick you into giving away personal
information to gain access to account numbers or to infect your machine with malware. Phishing
attempts can affect the security of your devices and lead to the theft of your personal and
financial data.

How To Avoid Phishing Attempts


Phishing attempts can often get through spam filters and security software that you may have on
your computer. To avoid phishing attempts you can:

Be vigilant

Watch out for things such as unexpected urgency or an incorrect greeting

Think twice about clicking a link or opening a document that seems suspicious

Double check URLS, ensure it looks legitimate

Hacking
Hacking is the unauthorized accessing of a computer system and the individual who does this is
called a hacker. Hackers may gain access to your computer or device through security weakness
phishing or malware. Once they have compromised your email, banking or social media
accounts, they can change passwords to prevent you from accessing your accounts. Scammers
often send out messages impersonating you, directly people to fake websites or asking them to
send money.
Hackers are usually excellent computer programmers. Many hackers are young people who hack
into systems just for the challenge or as a prank. Although this may seem harmless, it can cause
considerable damage and is illegal in many countries. The more criminally-minded hackers
access computer systems for one of more of the following reasons:

To steal important and highly confidential information.

To copy computer programs illegally

To alter data.

To destroy data either by deleting it or installing a virus to destroy or corrupt it.

To transfer money from one bank account to another using Electronic Funds Transfer (EFT).

Computer Ethics & Research 8


Internet Fraud
The term ‘internet fraud’ refers to any type of fraud scheme that uses one or more components of
the internet, such as chat rooms, email, message boards or websites, to present fake offers to
potential victims and to carry out fraudulent transactions. Major types of internet fraud include:

💡 Online Trading Schemes

Online trading is buying and selling of products over the internet. Companies or individuals set
up virtual shops or malls on websites that users can access to view items on sale. These
businesses claim to offer high value items for sale at low prices.
Internet fraud occurs when the company or an individual bills the customer for the purchase,
collects money and does not deliver item/s purchased.

💡 Credit Card Fraud

This type of fraud is a slight variation on the above OTS. Tis fraud involves setting up temporary
fake businesses on the internet. These businesses lure people into giving credit card numbers in
order to steal their money. A common method is to send emails pretending to be from a major
bank.

💡 Business Opportunity/ Work At Home Schemes

Many fraudulent schemes use the internet to advertise business opportunities that supposedly
allow individuals to get rich or earn large sums of money.
These typically require persons to pay for info & material, but then they fail to deliver the
materials, information on the job.

Other Online Scams & Fraud Schemes


The growth in online services & internet use has provided criminals with many opportunities to
commit scams and fraud. Common online scams include:

Computer Ethics & Research 9


unexpected prize scams

unexpected money scams

threat & extortion scams

identity theft.

💡 Unexpected Prize Scams

Unexpected prize scams include lottery scams, ‘scratchie’ scams and travel scams. These scams
can be delivered online, by telephone or by mail. They inform you that you have won a prize.
They usually ask to provide personal information.

💡 Unexpected Money Scams

Unexpected money scams include inheritance scams, ‘Nigerian’ scams, money reclaim scams
and other upfront payment or advanced fee fraud schemes. These scams ask you to:

Send money upfront for a product or reward

Provide personal information, pay lawyer fee to claim your inheritance or a large claim from
a distant or a deceased relative.

Transfer money on someone’s behalf with the promise of receiving money.

💡 Threats & Extortion Scams

Threats & extortion scams involve scammers sending random death threats vi SMS or email
from a purported hired ‘hit man’. The message contains threats to kill you unless you send the
‘hit man’ cash.

💡 Identity Theft

Computer Ethics & Research 10


Identity theft is a widespread crime that is constantly changing with the constant evolution of
technology an trends. Cybercrimes have various schemes to obtain your personal information
and use it to steal your money, sell your identity and commit fraud or other crimes under your
name. To protect yourself you can:

Shred personal documents

Use secure passwords

Use secure connections

Monitor accounts

Use detection products

Computer Ethics & Research 11

You might also like