Computer Ethics Research
Computer Ethics Research
💡 Objectives:
Explain the terms software piracy, counterfeiting, softlifting, hard disk loading and peer to
peer sharing.
Explain terms related to and methods of dealing with unethical behaviors such as trolling,
cyberbullying, phishing, hacking, internet fraud and prohibited, offensive and illegal
content.
Software Piracy:
A common copyright infringement is software piracy. Software piracy is the unauthorized
copying, use or selling of copyrighted software.
The main reason of software piracy is that its an infringement of ownership rights. It is the theft
of the work and effort of another individual or company. The owner loses potential revenue.
Reasons for using pirated software includes:
Pirated software may not contain all the elements and documentaries of the original
program, causing problems for the user.
Pirated software may not have the upgrade options often provided as an add-on, in
legitimate software.
Pirated software may have viruses that can be harmful to your hard drive or network.
All software is copyrighted, as the person or company who wrote it always retains the right to
decide whether or not it can be copied. However, is it not always illegal to copy and distribute
software. For example public doman software can be copied as many times.
The price of a new computer from a reputable company, usually also includes the cost of the
copyrighted software present on that specific machine. Therefore, a private purchaser of a
computer buys both the computer and a single -user license for the software on that machine.
Softlifting occurs when this licensed end-user makes copies of the machine's software and
distributes or sells it to other individuals or companies.
This form of commercial software piracy occurs when system builders purchase a legal copy of
software and then copy or install the software onto other computer hard disks. These hard disks
containing the pre-installed illegally copied software are then installed in computers and sold.
This method of file sharing allows normal users to connect directly to other users to share files.
Software piracy occurs when users share copyrighted works that they do not have the right to
share. However, it is important to remember that peer-to-peer is not anonymous, not secret and
can be unsafe.
💡 Internet Piracy:
💡 Counterfeiting:
Pirated software may not contain all the elements and documentaries of the original
program, causing problems for the user.
Pirated software may not have the upgrade options often provided as an oadd-on in
legitimate software.
Pirated software may have viruses that can be harmful to your hard-drive or network.
Pirated software is simply illegal - most countries have laws against software piracy. Individuals
convicted of this crime can play heft fines or even be jailed.
All software is copyrighted, as the person or company who wrote it always retain the right to
decide whether or not it can be copied. However, it is not illegal to copy and distribute this
software.
For example, open-source software (OSS) is software that s distributed with source code that is
released under a license in which the copyright holder grants users the rights to modify and
distribute the software to anyone and for any purpose. The modified versions may also be
redistributed.
For example. public domain software can be copied as many times as you like. Software is in the
public domain when it is put on websites for free distribution, with the consent of the copyright
owner. One popular domain program is Adobe, Reader, available from www.adobe.com
There is also freeware software available at specialist, websites such as NiniteWOT and
softpediaWOT. Once again this software is copyrighted, but you are not allowed to copy it for
personal use. In this case, the owners distribute it for free out of spirit of cooperation, or perhaps
to promote themselves as software writers.
💡 Cybercrimes:
Cybercrime is an issue that has an impact on the lives of many people, businesses and
organizations around the world. Cybercrimes are crimes directed at computers or other devices,
and where computers or other devices are integral to the offence. Cybercriminals are individuals
or teams of people who use technology to commit malicious activities on digital systems or
network in order to steal sensitive company info or personal data and make a profit. Common
cybercrimes include:
Hacking
Identity theft
The effect of cybercrime can be extremely upsetting. Victims may feel that their privacy has
been violated and that they are powerless. Unfortunately as the reliance on technology grows
worldwide, the cost and incidence of cyber crime is expected to increase. Therefore, to protect
organizations & individuals, governments around the world have passed or are working on laws
to deal with cyber crimes.
The main difference between cyberbullying and cyberstalking is one of age. If adults are
involved, the act is usually called cyberstalking. While among children, it is usually referred to
as cyberbullying. Examples that can occur include:
Spreading false rumors about an individual and encouraging others to join in the harassment
Sending devious, threatening, vulgar or harassing emails from a variety of email accounts
Hacking into an individual's online banking or email accounts and changing that person's
setting or passwords.
Bystander: A person who does nothing when they witness cyberbullying happening
Adjust your privacy settings on your social networking sites if you wish to continue to use
these sites.
Trolling
An internet troll is a person who deliberately posts abusive or derogatory online comments to
social media websites to provoke reactions from readers. Responding, usually makes their
abusive behavior worse. The extent to which trolls participate in negative behavior can range
from annoyance to extreme cruelty.
Establish a detailed policy for user comments to specify the kind of comments that are
allowed on your website and social media posts.
Sexting
Content the provokes the viewer into committing crimes and carrying out violent acts
Malware
Malware is a term used to describe different types of malicious software which include viruses,
worms, spyware, ransomware, Trojans and bots. Criminals may use malware to monitor your
online activity and damage your computer.
Malware is often downloaded when someone opens an infected email attachment or clicks on a
suspicious link in an email. Malware can also be used to steal your username, password or other
information, which is then sent to third party.
Using a storage medium such as USB drive or CD that contains infected files
Self-propagating, which is the ability of malware to remove itself, therefore spreading on its
own.
Garbled information
Be vigilant
Think twice about clicking a link or opening a document that seems suspicious
Hacking
Hacking is the unauthorized accessing of a computer system and the individual who does this is
called a hacker. Hackers may gain access to your computer or device through security weakness
phishing or malware. Once they have compromised your email, banking or social media
accounts, they can change passwords to prevent you from accessing your accounts. Scammers
often send out messages impersonating you, directly people to fake websites or asking them to
send money.
Hackers are usually excellent computer programmers. Many hackers are young people who hack
into systems just for the challenge or as a prank. Although this may seem harmless, it can cause
considerable damage and is illegal in many countries. The more criminally-minded hackers
access computer systems for one of more of the following reasons:
To alter data.
To transfer money from one bank account to another using Electronic Funds Transfer (EFT).
Online trading is buying and selling of products over the internet. Companies or individuals set
up virtual shops or malls on websites that users can access to view items on sale. These
businesses claim to offer high value items for sale at low prices.
Internet fraud occurs when the company or an individual bills the customer for the purchase,
collects money and does not deliver item/s purchased.
This type of fraud is a slight variation on the above OTS. Tis fraud involves setting up temporary
fake businesses on the internet. These businesses lure people into giving credit card numbers in
order to steal their money. A common method is to send emails pretending to be from a major
bank.
Many fraudulent schemes use the internet to advertise business opportunities that supposedly
allow individuals to get rich or earn large sums of money.
These typically require persons to pay for info & material, but then they fail to deliver the
materials, information on the job.
identity theft.
Unexpected prize scams include lottery scams, ‘scratchie’ scams and travel scams. These scams
can be delivered online, by telephone or by mail. They inform you that you have won a prize.
They usually ask to provide personal information.
Unexpected money scams include inheritance scams, ‘Nigerian’ scams, money reclaim scams
and other upfront payment or advanced fee fraud schemes. These scams ask you to:
Provide personal information, pay lawyer fee to claim your inheritance or a large claim from
a distant or a deceased relative.
Threats & extortion scams involve scammers sending random death threats vi SMS or email
from a purported hired ‘hit man’. The message contains threats to kill you unless you send the
‘hit man’ cash.
💡 Identity Theft
Monitor accounts