0% found this document useful (0 votes)
4 views

Trends in Computing and Ethical Issues 2

The document outlines the significance of Artificial Intelligence (AI) in modern technology, detailing its characteristics, applications, and impact on daily life, including areas such as robotics, healthcare, and cybersecurity. It also discusses the role of Prolog in AI development and addresses common myths and facts about AI. Additionally, the document touches on Virtual Reality and its immersive experiences, emphasizing the integration of AI in various technological advancements.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Trends in Computing and Ethical Issues 2

The document outlines the significance of Artificial Intelligence (AI) in modern technology, detailing its characteristics, applications, and impact on daily life, including areas such as robotics, healthcare, and cybersecurity. It also discusses the role of Prolog in AI development and addresses common myths and facts about AI. Additionally, the document touches on Virtual Reality and its immersive experiences, emphasizing the integration of AI in various technological advancements.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

CHAPTER OUTLINE

Artificial Intelligence, Virtual Reality and Augmented Reality, Internet of 1:hings (loT),
Intellectual property and corresponding laws and rights, software as intellectual
property. Software copyright, Software patents and t~e diffe~ence betweeh th~ t:vvo;
trademarks; software licensing and piracy, Cyber security, Net1quette, Spam, Ph,sh_ing,
Free software foundation and its position on software, open source software, various
types of licensing (e.g. GPL, BSD).

ARTIFICIAL INTELLIGENCE
In today's world of rapidly changing and
advancing technology, our intelligence works
as one of the greatest forces of innovation
and development. In true sense, intelligence
is the human capability of creativity and
problem solving facilitated by using one's
brains. It can also be described as the ability
to perceive information and to retain it,
as knowledge and behaviours within an
environment. Basically, intelligence includes
the following characteristics:
• Knowledge • Reasoning
• Problem solving • Perception
• Learning • Planning
• Thinking • Ability to manipulate
When these charcteristics are applied to machines, is is known as Artificial Intelligence
(AI). Artificial intelligence is commonly implemented in computer systems which are
completely based on software programs. It follows the logic of the computer programming
and acts accordingly. It can also be referred to as the opposite of Natural Intelligence (NI)
which is controlled and regulated by human beings.
Artificial Intelligence (AI) has already changed many aspects of our lives. In today's
world, AI plays a vital role in the modernisation of the society, which further enables us
to carry out our daily work easily and comfortably.
Artificial intelligence (AI) is the technology that makes use of machines such as computer
systems, robots, etc. to think and to learn just like the human mind does. This can be
done by developing computer systems and algorithms which are capable of learning
from data, reasoning, understanding natural language, perceiving their environments and
adapting to new situations. The goal is to create efficient systems, capable of mimicking
or surpassing human intellectual abilities, such as pattern recognition, problem-solving
and decision-making.
r. .l r is t1S
JV daY lives
ed 10 enhance and improve the efficiency of many products that w
like smartphones video
·
. . . ' .
h . .
.
e use m our
games, s oppmg experiences and even some
J8ftrts ability to find effia_e nt solutions for modern-day problems makes it one of the
tof t· sotlght-after technological components of the 21st century
. .
111051 or Artifici~l Intelligence refers, to as the field nf co111putcr sci('ncc that fornses on crC'ating
,.,tt~lige11t machines that can perfo1111 tn.:;/cs rmd 111n/ce derisions that typically require human
' ·//igence.
1
,,1t
' for eXample,
Robots are pr~grammable machines which can execute specific tasks with little or no
1
uinan intervention. Robots are even capable of working in difficult environments where
huinans cannot reach or in areas where the work environment is hazardous. There are
h,arious types of robots that we see in our daily lives, to provide various services to
~- 5ome of them include Humanoid Robot, Restaurant Robot, Business Robot, Security
Robot, etc.
features of Artificial Learning
5ome of the primary features of Artificial Intelligence are mentioned below:
, Learning: AI systems are capable of learning from data and experiences, which helps
them to become more effective over time. They employ algorithms and models to find
patterns, to anticipate the future and to modify their behaviour in response to the
feedback.
• Creativity: AI systems are being developed to exhibit creative capabilities. They can
generate art, compose music, write stories and provide novel solutions to problems.
• Autonomous Decision Making: AI systems can make decisions and take actions
independently without human intervention. They can evaluate information, weigh
different factors and execute actions based on predefined rules or learned patterns.
• Reasoning and Problem-Solving: AI systems are capable of logical reasoning, information
analysis and complicated problem-solving.
• Perception and Understanding: AI systems can perceive and interpret their environment
through sensors, cameras or other input sources. They can understand and extract
meaning from various forms of data, such as text, images or speech, etc.
• Natural Language Processing: AI can process and understand human language. It
enables machines to understand, generate and respond to human speech or text. Natural
language processing is used in chatbots, voice assistants and language translation
systems.
• Computer Vision: AI systems can analyse and interpret visual information from images
or videos by recognising objects, faces, gestures, and other visual patterns. Computer
vision is applied in areas like image recognition, object detection, and autonomous
vehicles.
• Adaptability: AI systems can adapt to changing conditions or new information. They
can adjust their behaviour, strategies or models to handle novel situations or unexpected
inputs.

~olog in AI
Prolog stands for PROgramming in LOGics. It is a fourt~ generation lan~age ':hlch is
to~pletely logical and declarative in nature. It is well-swted for d~velopmg logic-based
artificial intelligence applications. It allows the programmer to specify the rules and facts
~ ut a problem domain and thereafter, the Prolog interpreter uses these rules and facts
autornatically infer the solutions to the problems.

Tronnc in r.nmnutina and Ethical Issues 52~


Just to Know
The facts and rules are two basic elements in Prolog.
Facts: The fact is established and is true.
If we say, "Jimmy is the daughter of Jackson", then this is a fac t.
Rules: Rules are executions of facts which contains conditiona l clauses.
For example, the following fact has two arguments :
parent_of (P, Q) :- man(P), w oman(Q) . .
In this case, the fact states U1at if P is a man and Q is a woman, then P is the parent
of Q .
Prolog is not in the scope of our syllabus. TI1e Facts and Rules are explained just for
understan ding.

Apart from AI, Prolog is used in various other domains. Soi:ne of the ~elds include
Intelligent Database Retrieval, Natural Language Understan dmg, Machine Learning,
Robot Planning, Problem Solving, etc.

Artificia l Intellige nce in Our Daily Lives


Siri is one of the most commonly used intelligent digital personal assistant working on
the iOS based platform (Operating System). It helps in finding useful informatio n, using
your voice queries, with the initiating command as "Hey Siri" such as,
• Where is the nearest restaurant ?
• What is my schedule today?
• Remind me to call my friend at eight o'clock and so on.
The assistant will immediate ly respond, by finding and relaying informatio n on your
phone or by sending command s to the respective apps. Here, you will find that AI is
important to the apps that collect informatio n on your requests, recognises your speech
and push you in the right direction.

Just to Know!
Siri is an intelligent personal assistant and a part of Apple Inc.'s
iOS (Operatin g Systems). The assistant uses voice queries and
a natural language user interface to attempt to answer our
questions, make personalis ed recommen dations and perform Siri
, actions by delegating requests to a set of Internet services.

Areas of applicati on of AI
With the advancem ent in AI technology, we are not restricted to only SIRI but also are
extending the basic concepts of AI in various applicatio ns such as in self-drivin g cars,
while performin_g_ ~ritical s~geries in ~ospitals, in unmanned departmen tal stores and
many more. Artificial Intelligence (AI) 1s progressin g rapidly in the field of Science and
Technology. The areas where Artificial Intelligenc e plays a significan t role in our daily
lives are:
• Robotics
Robotics is a branch of engineerin g
which includes varied branches such
as Mechanica l Engineerin g, Electronic
Engineerin g, Computer Science, etc. It deals
with constructi on, design and control of
sensors and informatio n processing . These
technologi es, when put in a device, is known
as a robot.
• bots are assumed to be vital d .
~,e ro tivities in the near future ur evices which can b
----•••11111111
,,;r ac f . vve may c e used t0
tltc;, the appearance o a human be· reate a robot. · replace hum
#e obots are even useful in sommg. They Walk, talk tinh.anky form but, most ~~sthand
the r f e sensitiv 1 , in and
~;~
ov,,,.cw
-•lt or unsa e such as bomb dete t· e P aces where respond as humans
em
c ion a d b our app h •
.. rt ;\ssistants n omb deacti vati roac es are either
SJllll> on, etc.
' neral, a person who assists so .
Jll ge lk b . meone is call d
,,1nat
vvi-
if we. ta a out. a vrrtual ass1·stant or a e an assistant •
art/ virtua1 assistant is loaded smart assistant?
As01 I h 1 onto the d . .
!k!Tare app. t e ps the user by . ev1ces with the
sow· . th . d answering q .
perforrrung e requrre tasks or serv·ices. ues tions and
, reover, it can also control othe.
l"'10 I smart d ·
sJJlart TV, sma~t light, smart speakers etc S ev1ces such as
norrnallY Wi-F1-enabled and are hand · mart speakers are / J
controlled from a distance using ou y speaker~ which can be .-/
r voice for instructions
5orne well-~own smart assistants include Alex .
Google Assistant by Google. a (Amazon product), Siri (iPhone) and
, Health Care Industries
Al can track patient data more efficient!
than _hu1:1ans can. Using AI, health ~~~ ~::~::- - -.i

orgarusations can get the patient's


reports even more precisely collected
and analysed than before.
In rece~t days, Robot-assisted surgery
has gamed a lot of popularity. As a
resul~, man~ hosp~tals are implementing
robotics which assists them in completing
the tasks more precisely. For example,
the ro_l~ _of AI in open-heart surgery can not be denied, where they exceed human
capabilities and efficiency.
' Cyber Security
In today's world, local and digital security
are of the greatest concerns for all of us.
.... '
Artificial Intelligence in Cyber Security
" '
We not only want to keep ourselves safe --.. • - ,\, \,

.
"' " \ // t///llll/lll//l);Nll/11'\

but also the surroundings we live in.


0
·.1 .. -.:- - \ ·""\"" '""""
'11• •• I I
+~\ 'll11i1111

For example, \
"
.._
• •
I ...~ .. • '-.: 'I.
'/lllltl ~lfll/ U,,

The security teams now-a-days face many '··~-· .,, ,;


challenges with sophisticated attackers, ~v ~
~ ~
\.., ,, - ~-
we put their lives in danger. Here, AI-
, 4111- ?
based security system or cybersecurity
systems can provide them with up-to-date knowledge of global and industry specific
threats. This can help them in making critical prioritisation decisions based upon the
input data. It helps, not only in protecting the devices connected to the internet, but
also the enterprises itself.
When we protect the devices which are connected through the internet, it is called
Cyber Security. It includes protecting hardware, software and data from the threats of
cybercriminals. However, the individuals and organisations can also use these practices
to protect themselves against unauthorised access to data and other computerised
systems.
• Video Games
It is one of the most common applicatio ns which uses artific~al
intelligenc e for its functionin g. The technolog y of virtual rea~ity
makes online games even more thrilling and exciting usmg
virtual reality under real situation. At times, Al prompts us
to respond to the stimuli and react in unpredicta ble ways, to
make the game more enthusiast ic.
• S mart Cars
Have you ever thought about reading the
newspape r or books while driving? Now, that
dream is a reality. Self-drivin g cars are supported
with advanced electronics and microproc essors
which achieves this feature. This technolog y help
in GPS navigation , reverse sensing system and
night vision. The technolog y also enables the user
to visualize animals, people and other vehicles
beyond the normal range. Moreover, these cars are also featured with smart card activation
instead of using keys, automated parking etc. In reality, the smart cars have made great
impacts in our lives.
Playing Chess
You know while playing a Chess game, two players are
required. With the induction of AI, the task becomes easier
and you can choose your computer, as the other player.
While playing, the computer equally applies its intelligenc e
to respond to the challenges put up by the opponent.

Conclus ions
Many smart home devices have the ability to learn our behaviour al patterns. This helps
us in saving money by adjusting the settings on our thermosta t, or other appliances,
thereby, increasing our convenien ce and saving energy.
For example,
1. Turning the 'Room Heater' off when we leave for work. It can be performed by
adjusting the thermosta t to turn the 'Room Heater' ON, when we are at home. Thus,
it helps us by saving electrical energy when we are out.
2. Lighting is another example, where we might see some basic artificial intelligence
being applied. By setting defaults and preference s, the lights around our house (both
inside and outside) might get adjusted. It depends on different situations like where
we are and what we are doing.
The different settings could be like, dimmer for watching TV, brighter for cooking
and medium light for eating.
Thus, the use of AI will also make our home 'Smart Home'.

Myths and Facts about Artificia l Intellige nce


Myth: 1. Robots are dangerous because they can control and regulate human movements.
2. Artificial Intelligenc e cannot control human beings.
Fact: 1. Misaligne d Intelligenc e is the primary concern and may even result in disaster.
It needs only an Internet connectio n to carry out the mischief.
2. It is the human intelligenc e that enables the control.
\f1}{fUAL R E A L IT Y .
w co nc ep t in th e .
Virtual Re al ity is a ne ea te d by u . di ta l worJd ' whe re an
gi
en t is cr si ng a so ftw are. It is presen te d
•ficial en vi rothnmt th
ar tl e us er s su sp en d th ei r b . pt
irt such a w ay a_ t. elr e( sy s te m and acce
vi ro nm en
it as th e re al en
ab ov e co ntex t th
With re fe re nc e to th e hi ch w e , e _w or d a'vi rtu al' is r(• fe rrr d
al ity ', w h
to as ne ar an d ,'re. ex pe ne nce ,s um an being~
al ity ' ba s ica ll '-
-rec1 lity'. Ew. •r ythin ,.,u th a we 111.n nw
aJ re t
Thus, th e te rm vi rtu ou r se y m ea ns n~ ar
s th ro ug h ns es . O ur corn PICt"e ex pe r1 <•n cp of n~-a l't
about th e re al. ityf, c0111e
y
. ' 19 «um pl y
ti' a lio n d . ~
.
a coin b m a on o se
ns or y m fo rm an ou r br
ii
ai n 's
se m ie- m a king m ec ha · · 1r th a,
ni sm ~ fr
y th at vi rtu al l'eaJ1'ty en ta s th e p resen ta tion of ou r qer, ~ w 'th
event. So, w e ca n sa . en vi ro nm t w h kh we ca n e I . . , a
ra t e d vi rtu al ' w ayq
co m pu te r ge ne
. . . en
ed th xp ore m va no u~
pe rie nc ThP
nu s re al ity is pr im ar ily ex
h rou gh _ ou r se ns es of c,ig h t an d ~ound.
al re al ity is a 3 D (T ) image th at can be f!"
J'plored
simplest fo rm of vi rtu rbe e dD 1m en si on al .
on al cm np ut er. It ca n e on e by. m ar up . 1 m
u at g th e co m pu te r ke
y~
interactively on a pe rs .
th e co nt en t of th e im ag e m ov es m so m e d 1.rec on or zoom s m nr ti
or the m ou se so th at . S de r:
pl ic at io ns fo r vi rtu a1 re a1tty. om e of th em ar e mentione d as un ·
out. Th er e ar e m an y ap . .
r ) A ch it tu (b) Sp or ts (c) Medic in e
\a r ec re
(e) En te rta in m en t
(d) A rts

C on cl us io n en t pr es en te d to ou r senses in su
ch
en vi ro nm
cr ea tio n of a vi rtu al nm en t. It can be used
for the
Virtual re al ity is th e. in th e sa m e en vi ro
nc e ou r pr es en ce le m so lv in g. We can ex
pe ct m an y
a w ay th at w e ex p~ ne w el l as cr iti ca l pr ob
m en t an d as
pu rp o_ses of ~n te rt am of th e te ch no lo gy in th e ne ar fu tu re .
m or e in no va tiv e us es
L IT Y
AU G M E N T E D R E A w he re w e focus directly or
ve rs io n of re al ity
It is an en ha nc ed al w or ld el em en ts of th e el}vironm
ents.
ys ic al , re pr og ra ms
in di re ct ly on th e ph ar e de si gn ed es pe ci al ly in 3D
re al ity ap ps io n in
Titis ty pe of
ve lo pe r to an im at e th e di gi ta l in fo rm at
w hi ch al lo w th e de
th e co m pu te r pr og ra
m.
s fo r gl ob al po sit io ni ng sy ste m (GPS), to
ne
ns su ch as sm ar tp ho in in g for object an d ge
sture
It in cl ud es ap pl ic at io m ili ta ry, du rin g tra
lo ca tio n or by th e
pi np oi nt th e us er 's
virtual
re co gn iti on . nd in g in to a di gi ta l interface by placing
tu rn s ou r su rr ou are m en tio ne d below :
A ug m en te d Re al ity A ug m en te d Re al ity
ap pl ic at io ns of
objects. So m e of th e

co nc ep t . of
• By us in g this ~ -
surgical
au gm en te d reality, m e m uc h
pr oc es se s will be co
ll re du ce
m or e si m pl er an d wi
pr ob le m s
th e ch an ce s of m ed ic al
plica ted
ar is in g af te r a com
ha s
• A ug m en te d re al ity su rg er y.
gr ea t helps the
he lp ed in of fe rin g
r ex am ple: Ey e De cide is ~ ap p wh ic h
Fo
ga m in g ex pe rie nc es . ab ou t th ei r eye he al th
.
pa tie nt s kn ow m or e
Difference between Augmented Realit y and Virtual Reality
Virtual Reality and Augmented Reality can be considered as the two sides of the same
coin. However, they can be distinguished in the following ways:
• Augmented Reality simulates artificial objects in the real environment whereas Virtual
Reality creates an artificial environment for the user to inhabit.
• In Augmented Reality, the computer uses sensors and sets the position of a camera.
• The AR technology then condenses the 3D graphics in such a way that they would
appear from the viewpoint of the camera which would superimpose the computer
generated images over a user's view of the real world.
• In Virtual Reality, rather than locating a real camera within a physical environment,
the position of the user's eyes are loca ted within the simulated environment. When
the user turns his head, the graphics move accordingly.
• Virtual Reality technology creates a convincing and artificial interactive world for the
user.

I~TERi'\TET OF THINGS (IOT)


It is an environment where different objects are accessible with the help
of Internet. The built-in-sensors have the ability to transfer data over a
network. The technology embedded in the objects help in interacting
with the internal as well as external environment to perform the tasks
accordingly.
The sensors such as accelerometer, proximity etc., which are
embedded in smart phones, help to monitor the movements of the
user.
For example, Web enabled lights like those in of 'Phillip's Hue', help us in reducing the
consumption of electricity by automatically turning off the lights when no one is in the
room.

The impact o f IoT on Society


The innovation of 'IoT' applications, is not only improving our lives but also affecting
our livelihoods. The Web embedded technology not only optimizes the energy usage but
also protects .the people from disasters which are among the positive applications of IoT.
The 'driverless' car is an interesting example of loT, but for
every driverless automobile, a human is losing his job. Over all,
the introduction of technology at every stage of life may be a
threat but we need to understand the manner in which we can
meet those challenges, that come with it.

SOCIAL IMPACT AND ETHICAL ISSUES


INTRODUCTION
With the advancement of Information Technology (IT),
the world is witnessing vast changes. IT becomes a
powerful tool in giving us new and innovative ideas. It
also helps us in making new inventions and discoveries.
At the same time, we also come across many ethical
dilemmas while using Information Technology. So, while enjoying the fruits, we should
also ensure that the information or technology is not being misused to create a negative
impact on the society and the people it inhabits.
Ethics _are a set of mor~l principles which govern the behaviour of a group of individual.
In ~e fiel? of Information Technology, ethical responsibilities are known as computer
ethics, which regulate the use of computers. Some common issues of computer ethics
IIF' cl de intellectual property rights (such
electronic content), priv acy
~ :erns, and ~o~ computers affect the socit:~.copyrighted
11
for extm1ple, 1t IS easy to mak e a dup li e codpy of electronic (digital) cont ent But
uter ethi cs .wou ld sug gest that it 1·s wrc a •th · ,
camP ong to O appr opri ate appr oval .
onal ::; wi ~ut the
Jt maY be poss ible to _acces s som eon e's pers _ormation on a com pute r system.
ise that such .
u wever, com pute r ethi cs adv an actio n is unet hi . essentia l to
. 1s
1 Th us, it
po . e thi cal v al ues and rule s whi l . . ca ·
, ]Jow cert ain e acce ssin g digi tal content.
10

Ethic-a' Issu es in Com put er


n,e following are som e of the ethi cal valu es whi ch
iron men t and m . t . hare nece ssar y to create and foster goo d
Iations in a digi tal env
. am am a ealt hy wor k cult ure
re . war e with t • . . ·
• Do not inst all or urun stall any soft ou pno r perm issio n
. ·. y
e to another unn eces saril
• Nev er mov e the pen phe rals from one plac ·
• Do not try to stea l secr et info rma tion
from any com pute r.
e for whi ch you h ave not paid •.
• Do not cop y or use prop riet.ary soft war , ·
you r conf iden tial doc ume nts also b y usm ·
• You mus t prot ect g secu rity mea sure s like
prop er pass wor ds.
· ails
• While acce ssin g Inte rnet, you sho uld not b row se unw ante d web sites or ope n e-m
of others.

J'\.T,...J'J I re TU AI l>R OPE RTY RIG HT


S
.lz1p of Ideas', whi ch is crea ted by usin g the
Intellectu al Pro pert y Rig hts mea ns the 'O,l 11u-::
1

dev elop men t of a soft war e mai nly requ ires


skills ~d men tal abil i~ of a pers on. The
kno wled ge, whi ch is uniq ue. The soft war e/
the abil ity t_o _create a first -han d acco unt of
), beco mes the inte llect ual prop erty of that
prog ram ongm_ally dev elop ed by a pers on(s
follo win g prop ertie s:
person(s). The mte llec tual soft war e has the
(ii) Soft war e pate nts (iii) Trad ema rk
(i) Soft war e cop yrig ht

(;) ',oft wa re Cop ) righ t


mak ing the copi es of a
Soft war e cop yrig ht proh ibits the user s from
the pers on/ com pany , whi ch
soft war e prog ram with out the perm issio n of
• i.

. Soft war e copy righ t is not


mig ht hav e issu ed the lice nse for the prog ram
righ t. How ever , ther e are
essentia lly diff eren t from any othe r sort of copy
specific to a soft ware . The re
cert ain aspe cts of cop yrig ht law whi ch are
othe r thin gs whi ch can be
are som e diff eren ces bern reen soft war e and
, scul ptur es, etc.
cop yrighted such as boo ks, poe ms, draw ings
deg ree of cont rol ove r
The cop yrig ht law give s prog ram mer s a high
er's perm issio n is ther efor e
the pro gram that he or she crea tes. The own
.
necessar y, if you wan t to nm the prog ram
if you wan t to mak e a
The perm issi on of the own er is man dato ry,
how ever , an exce ptio n
copy of the pro gram for any reas on. The re is,
spar e copy , in case the
for the mak ing of a 'bac k-up " cop y i.e., a
Soft war e cop yrig ht law
orig inal is eras ed or dam age d by acci dent . e.@l 3
cop yrig ht prot ects only
affects any one who uses a com pute r. The
beh ind the prog ram . It
the com pute r pro gram, but not the idea s
a com pute r prog ram ~rit ten by som e~n e
mea ns tha t it is perf ectly perm issib le to take e,
e thin g. If you wer e the first pers on to wnt
else, and writ e ano ther that doe s the sam
ld hav e no righ ts n:1 the con cept of any ano ther
(say, a spel ling che cke r prog ram ), you wou
only hav e yo~ ngh ts ?n ~e actu al prog ram
prog ram whi ch chec ks spel ling . You wou ld
copy , mod ify or dist ribu te the soft war e,
that you hav e writ ten. Th.us, in ord er to nm,
authorisation is necessary from the own ers.
Generally, the programmer who writes the program owns the rights. In a situation
where there is more than one programmer, the Directive provides for co-ownership. There
are certain exceptions to software copyright. The Directive states that, if you have acquired
a computer program lawfully (i.e. with the rights owner's permission), then:
• You are entitled to use it for the intended purpose .
• You are allowed to correct errors in the program. (However, if you only possess the
object code of the program, you must make corrections while the program remains
in that form. You are not permitted to decompile it, i.e. convert it into source code
form, in order to make the error correction easier.)
• You are allowed to make a back-up copy of the program - which means a spare
copy, in case the original is erased or damaged by accident.
• You are entitled to study and test the program in order to discover how it works.
• You may also exercise the "decompilation right". However, this is a special provision
of the Directive which is only relevant to computer programs.

(ii ) Software Patents


The Software Patent defines the rights given to
a programmer for the invention of a particular
software. Patent laws can be used to restrict Know
the freedom of copying, using, distribution and about
.soft1_N_arc'r
modification of published information. Patent
Software patent does not have a universally
accepted definition. The Foundation for a Free
Information Infrastructure is that a software
patent is a "Patent on any performance of a computer realised by means of a computer
program". In 2005, the European Patent Office suggested that a software patent is a patent
for a computer program claimed as such, or an algorithm or computer-implemented
business method that makes no technical contribution. However, they could not come to
a conclusion about which software patents should be granted, if at all.
A patent is a set of exclusionary rights granted by a state to a patent holder for a
limited period of time, usually 20 years. These rights are granted to patent applicants for
the disclosure of their inventions. Once a patent is granted, no other person may make,
use, sell or import/ export the claimed invention, in that country, without the permission
of the patent holder. Generally, the permission is granted in the form of a license, the
conditions of which are set by the patent owner. It may be gratis or in return for a royalty
payment or lurnpsurn fee.
Patents are territorial in nature. To obtain a patent, inventors must file patent
applications in each and every country in which they want to use the patent. For example,
separate applications must be filed in Japan, China, the United States and India, if the
applicant wishes to obtain patents in those countries. However, some regional offices
exist, such as the European Patent Office (EPO), which act as supranational bodies with
the power to grant patents which can then be brought into effect in the member states.
An international procedure also exists for filing a single international application under
the Patent Cooperation Treaty (PCT), which can then give rise to patent protection in most
countries.

(iii) Trademark
A trademark is an identity to preserve a software. Sometimes, a trademark becomes such a
success that it is actually worth more than the product. It helps in selling an image or an
identity of the product rather than the product itself. A trademark or trade mark, identified
by the symbols™ and®, or mark is a distinctive sign or indicator used by an individual
r . organi sation . It identif ies the prod uct sand/ or · .
SJiless origin ates from . service s, with which the tradem ark
1,tJ ppears . The tradem ark
5ig1' a ,ices from those of other entitie s. A tr aaduruq ue ~ource to disting uish its produc ts
r sef' d emark 1s a typ f .
o d typically a name, wor ' phrase , logo, symbo l desi . e o Intellectual proper ty,
aI1 elemen ts. The owner of a re(no:::t ered tr d ' gn, IIDage, or a combi nation of
wese .
infrin o~ a emark may co
tradem ark gemen t to preven t unauth . d mmen ce 1egal procee dings
for . onse use of that tradem ark
referre d to as an dis . . . . .
fhe term trade ~~k IS -~o te by which an
. diVidual is readil y identi fied, such as the well kno tinguis hing _a~nbu
Jil ential functi on of a tradem ark is to exclus ive! 1 .d ~char acteri stics_ of celebrities. The
th source or origin
~sproduc ts or servic es, such that a tradem arky en 1 e corn.i:ne~c1al
md1ca tes the source or
o r,res as a badge of origin . The use of a trade m~tr ~p~ calle~, as trademark use
se m sway 1s known
rights genera ll . f ·
It should be noted that the tradem ark
~: ~:\:,~ :e~r
to m~ta in exclus ive rights over that sign, in relatio n t~ ;;~~:; ~r~d~ '
assuming there are no other tradem ark obJ·ections dunn·g e mg process. th fil'

Infrin geme nt
An ~gem ent ref~rs to as the act of violati ng laws or rights, breach
or an unauth orised
can say that it is the
act with ~espec t to ~telle ctual proper ty right. In other words , we
Someo ne can
act ?f usmg _a no_the_r s pro~ec ted intelle ctual proper ty withou t permis sion.
re of the proper ty
be liable for infrmg mg on mtelle ctual proper ty, even if they are unawa
whfrh is protec ted.
The infring ement can furthe r be catego rised in the follow ing ways:
• Copyr ight Infrin gemen t
produc tion of
Copyr ight Infrin gemen t occurs when a third party violate s the use or
permis sion of
any of the creato r's exclus ive rights to the work withou t acquir ing the
, broadc asting,
the copyri ght holder. It may includ e variou s distrib utions such as selling
adapta tion or cop ying of the work.
• Patent Infrin gemen t
manuf acture s,
When a third-p arty, other than the patent ee or licensee of the patent ee
permi ssion/
impor ts, uses, sells or offers the patent ed techno logy for sale withou t the
license from the patent ee, it is known as patent infring ement.
someo ne else
In other words , if the rights grante d to the patent ee are exercis ed by
on or patent
who is not authqr ised by the patent ee, it would be consid ered as a violati
the law.
infrige ment and the person is liable to face for the conseq uences under
• Trade mark Infrin gemen t
Tradem ark Infring ement refers to the
unauth orised usage of a mark that
is identic al or decept ively simila r
to a registe red tradem ark. In such
a scenar io, the onlook er may get
4A.~ Origi nal \
~i:y
l ad idol ls
con.fused about the origin of the adidas I
mark of those goods or service s.
ns:
A registe red tradem ark is said to be infring ed under the follow ing situatio
ark.
• If the mark is identic al or decept ively simila r to the registe red tradem
• If the identic al or simila r mark can cause con.fusion in the minds
of genera l public
with the registe red tradem ark.
contra ry to
• If the tradem ark is advert ised and as a result it takes unfair advant age,
. .
the hones t practic es of the registe red tradem ark.
or labelli ng
• If the registe red tradem ark is used in the materi al ~eant for packag mg
of other goods witho ut due author isation of the registe red user.
4
DATA PRO TECT ION ON THE INTE RNE T
When you access the Intern et to get inform ation from a
websi te or to share your inform ation, then you sho.u ld
under stand that it is being made available world w ide.
In this situation, it is crucial to keep your data safe. The i
prim ary threat to data is in the form of viruses, which
enter either tlu'oug h e-mails or while accessing U11wanted
websites.
D11ti1 rrotcl /1<1 1 can be define d as the secul'ity or pro tection
of data or inform ation on
the Intern et, from tl1e comp uter viruses, spamm ers or hackers.
In this regard , ~he Data
Protection Act (DPA) plays an impor tant role in taking care of users
and protec ting their
personal inform ation from going into the wrong hands .
Howe ver, a major proble m arises while protec ting the data which
is comin g throug h the
Intern et. Thus, we must take care of tl1e follow ing points to ensu
re that the information
is protec ted:
• Do not disclose your passw ords to anyone (inclu ding your friend
s). They may open
different w ebsites and misuse your accounts.
• Do not down load unwa nted softw are/fr ee softw are from the
web. It may corrup t
your system.
• Somet imes, you may come across some unwa nted e-mails which
offer you differe nt
schemes or free gifts. Do not read/ open such unwa nted e-mails as
they might contain
viruses.
• It is advis ed that you shoul d install high qualit y antivi rus progr
ams or signat ory
anti.vi rus progr ams of a repute d comp any in your compu ter, to protec
t yours elf and
your system again st comp uter viruses.

Softw are Pirac y


When you purch ase an origin al softwa re, you becom e
a licens ed user and you have the right to use that
softw are only on a single compu ter. Howe ver, you
canno t put copies of this softw are on other machi nes
~ ~ ~·:d
or pass this softw are to your colleagues which then ,y right SQF.=TWARE oop
becom es illegal. Thus, piracy means illegal distrib ution neryed 'P IRA CY a11rlghts11
of a software.
When someo ne copies a softw are witho ut buyin g
the appro priate license or copyr ight, it is know n as
Software Piracy . The bigge st proble m in today 's world is to keep
a check on makin g
duplic ate copies of the origin al softw are and using it illegally. Makin
g duplic ate copies
not only promo tes uneth ical behav iour, but also affects the sale
of the origin al software.
Howe ver, even thoug h many users know that a pirate d softw are
has no reliability, they
prefer to use them, as they are cheap in comp arison to the origin
al softwa re. Howe ver,
we must under stand that even if the softw are piracy is delibe rate
or uninte ntiona l, it is
illegal and punis hable by law.
Piracy comes in many forms. Some of them are given below :
• Licensed user duplic ation for unlice nsed users: This refers to the
copyi ng a softwa re
witho ut havin g prope r license/ copyr ight and distrib uting it amon
g friend s .
• illega l Intern et Distri bution : When you order a softw are over
the Intern et, make
sure that it is ordere d from the autho rized distrib utors. This is
becau se there are
websi tes which distrib ute softw ares illegally and in case of such
softw are, there is
no guara ntee that the softw are obtain ed is secure or that it will work
prope rly when
install ed.
If' y
·~ to avoi d P irac
. .
\'V8)~
wada ys, the dupl icati on of the . .
11al softw are (pirac y) 1s .
!'Jo.or prob lem . We need to take ~ngf1 e ollow in a
!Jla} . g prote ctive steps
to avoid it:
A].wa ys buy your softw are from a repu ted .
• . When
in doub t, conta ct prrac y@ad obe.com for o~gdan 1satio n.
Make sure that your softw are comes with . gui ance.
• original disk an d auth entic p ack a I'icense agree ment
.
ag111g
c
,
.
• Avoid buym g mult iple softw are titles .' .
on a singl e disk. ftom diffe rent publi shers
• If the selle r p rovid es a seria l n umb
it indicates that the softw are is not er tohthe1: than the one ment ion ed· on th e pac kage,
au entic.
free Softw a re
When you perfo rm diffe rent task s on your
~ -
computer, you m ay need some speci al typ
software to get the job done . In such circu msta :ce~
f - rno, 111,
g Thunderbird' ~
-

0 mm, -

I
1

' dC
you may try to get the softw are from the Int (>Pot Playe r
Free Soft w ~
- · arc is
/:,.1ce -;oft,u • a softw ernet
h , ares ,u,11pa11"
J. .

free o f cos t . Th e 1
· are w ere ~
- ~ Spotify· r.9\ Firefox ~ •-
the user has the freed om to run copv ct·
1s
tr·b
1 ute, ~ ~
h . ' J'
W tx1? S
term . •
~tudy, c ange ~d rmpr ~ve the softw are. The . B1tTorrent-www.tlO ch-.CDm ,_,.,,,.,.. _
Free Softw.
are 1s some time s misu nderS t 00d as It
has noth ing to do with the co s t . M ore preci·sely, It •
the users : refers to four kinds of freedom for

• The freed om to run the prog ram for any purpo se.
t it to your need s.
• The freed om to stu~ y how the prog ram work s, and adap
/frien ds.
• The freed om to redis tribu te copie s to help your neigh bours
impr ovem ents to the public,
• The freed om to im~r ove the prog ram, and release your
so that they can enJoy the bene fit of the upda tes.
oms (as f
A l:'rog ram is a free softw are, if the users have these freed
m~nt ione~ abov e). So, you shou ld be free to redis tribu te copie
s, eithe r -~ -
anyw here.
with or with out modi ficat ions for distri butio n, to anyo ne OFRE E
SOETWAR E
modi ficati ons and use
You shou ld also have the freed om to make ~

g that they
them priva tely in your own work with out even ment ionin t
exist.
ram must be available for
Free softw are does not mean non-c omm ercia l. A free prog
ercia l distri butio n. Commercial
comm ercia l use, comm ercia l deve lopm ent, and comm
such free commercial softwares
deve lopm ent of free softw are is no longe r unus ual and
are very impo rtant .
there are limits on what kinds
Most free softw are licen ses are base d on copy right , and
copy right -base d license respects
of restri ction s can be impo sed throu gh copy right . If a
any other sort of unan ticipa ted
freed om in the ways descr ibed abov e, it is unlik ely to have
some free softw~re lice~ e~ are
probl em (alth ough this does happ en often). How ever,
r range of possible restrictions.
based on contr acts, and contr acts can impo se a much large

Ope n Sou rce Soft ware e P.hilosophy, and further


The Open Source Definition, notab ly, prese nts an open s~ur<~ tion of. an open s~~c e
s a boun dary on the usag e, modi ficati on and redis tribu
define
woul d ~the_rwi~e be prohi bited
software. Software licenses gran t right s to the users whic h
by copynRh f . Thes e inclu de right s on usage , modi ficati
on and redis tribu tion.
a grou p of indiv idual s
The fr; e softw are mov emen t was launc hed in 1983. In 1998,

advocated that the term free software be


replaced by open source software (OSS), as ~ odoo ,..... ~ dlt .......
~
an expression which is less ambiguous and MySCL Ji(
foundation

more comfortable for the corporate world.


~

ft
.Joorrlar
Software developers may want to publish
their softwares with an open source license, ~nott- ---• -··= ~
WoRDPn:ss

so that anybody may also develop the same ~~


. ,
open sour~e rijl Magenta
Initiative - -.- . .
software or understand how it works. Open
source software allows anyone to make a
new version of the software, port it to new
~ £ Java
,V"' =
e -
ubunt u
operating systems and process architectures an:>~01:>
and share it with others or market it.
Open source software can be defined as computer software for which the human
-readable
source code is made available under a copyright license that meets the
Ope~ S~urce
Definition. This permits users to use, change, and improve the s9ftware, and to
redistribute
it in modified or unmodified form.
The distribution terms of an open-source software must comply with the
following
criteria:
1. Free Redis tribut ion
The license shall not restrict any party from selling or giving away the softwa
re as a
component of an aggregate software distribution containing progra ms
from several
different sources. The license shall not require a royalty or other fee for such
sale.
2. Sourc e Code
The progra m must include source code, and must allow the distrib ution to be
held in the
source code as well as the compiled form. In a situation, where some form of
a produc t is
not distributed with the source code, there must be a well-publicised means
of obtaining
or downloading the source code via Internet withou t charges.

3. Distri bution of Licen se


The rights attached to the progra m must apply to all the users to whom
the progra m
is redistributed withou t the need for execution of an additional license by
those parties.
4. Licen se Must Not Be Specif ic to a Produ ct
The rights attached to the progra m must not be depend ent on the progra m
being a part
of any particular software distribution. If the progra m is extracted from that
distribution
and used or distributed within the terms of the program's license, then all
parties, to
whom the program has been redistributed, should have the same rights as those
that are
granted with the original software distribution.

5. Licens e Must Not Restrict Other Softw are


The license must not place restrictions on other softwares which are distrib
uted along
with the licensed software. For example, the license must not insist that all other
progra ms
distributed on the same mediu m must be open-source software.
Examples of open source licenses include GNU General Public License (GPL),
GNU
Lesser General Public License (LGPL), GNU Affero General Public Licence
(AGPL).

Note: GNU stands for GNU's not UNIX. It is an operating system and free
software as a
replacement for UNIX. Sometimes, it is also written as GNU General Public
License .

Open source softw are versu s Fr ee softw are


~ ,o~n 50 urc
e so fh ,va re an
. h fr
d fre e so ftw are are dif fe
fo r the ren t ter ms for the so
.
ms , co me
l •r l certain ng ts, or
ee do
Op us er. Th ey de scr ibe th twftw are wh ich
,,11~ sophie s tow ard s fre e so ftw are~ re s: s~urce an d free software beoth ~ apl:"roaches an d
en sin
plli!~ are free fro m ow ne rs lic c lti~ tion s. It m ay be us ed , co pie d s~~tdr~1bde ,
sofrn:-a_res
mo dif ied
th ou t res tri ' e
wl~ red ist rib ute d wi th or wi on .
aJl . th at th ere are so m . .
r.rowever, 1t mu st be no ted e s1g ruficant dif fer en ces b e tw een free
Il so ftw are
u-...,are an d op en so ur ce •
so1 ~.. t
') fre e so ftw are fo cu se s on fre ed om o us e an d no t f ree of cos t.
(I so ur ce b t
ii) Ev ery fre e so ftw are is op en u no t all op en so u rce sof tw ares are free sof tw ares.
( . . po se d on fre e so ftw are triction s on
(iii) No res tnc tio ns are im an d the re ma y be so me res
op en so ur ce so ftw are .
ce so ftw are w . ion
The de fin iti on of op en so ur ca ses o~ s wftwn tten to be_ alm os t ide nti ca l to the d efinit
of free so ftw are . Th ere are ve ry few so are s wh ich a fr ee sof tw ares bu t are no t
d vic. e-v ers a. Th e dif fer en ce . th . re
open so urc e, an gi . mt h e ter ms is wh ere the y lay the em ph asis
in ter ms of ts the go al of
''Free so ftw are " is de fin ed vm g e us er fre ed om . This reflec
nt.
the free so ftw are mo ve me
.
be lie ve s tha t free h tw 0 , an d
The Op en So ur ce In iti ati ve ob lem wi th the t:; m ,, me aru ng s:f ~e e as ~ fre ed om ng
e pr
free as "in no t for sal e". Th y an d d" tr· b op en so urc e Is tha t It say s no thi
mo dif us ed b 1 h hin k tha t
about the fre ed om to re is Ictiute So it is Y pe op e w o t ·
ur ce wi th ou t res tri o~ . '
they ca n ac ce ss the so
e
Publi c D om ai n So ftw ar pu bli c do ma in
blic So ftw are is a so ft: va re wh ich is av ail ab le in the bli cly
Pu
rig ht or ~d iti ng res tri cti on s. It ca n be pu
and ~~s no _le g_al, co py s. Fu rth er, it ca n
dif ied , d1 str 1b ut~ d or so ld wi tho ut an y res tri cti on d th ·t
mo ftw are ha s no ow ne rsh ip an us, I
tha t Pu bli c do ma in so .
be sta tedbl f d co mm erc ial isa tio n by an yo ne
. ail e, mo dif ica tio n an
IS av a e or us e so ftw are
no ted tha t it is dif fer en t fro m fre ew are an d fre
It mu st be
pa ten ts.
which ha s co py rig hts an d
For example, SQ Li te

•f }Mtt
e (G PL )
Ge ne ra l P ub lic Li ce ns NU GPL
ne ra l Pu bli c Li ce ns e (G
The GN U Ge
is a wi de ly us ed fre e so ftw are le\./f~'i,j.!'~~~''
or sim ply GP L)
by Ri ch ar d St all ma n for
lic en se, ori gin all y wr itt en
L is the mo st po pu lar an d General Public License
the GN U proJ· ec t. Th e GP ftw are .
fre e so
we ll- kn ow n ex am ple of a
GP L is sai d to gr an t
Un de r thi s ph ilo so ph y, the
ute r pr og ram , the rig hts d, ev en wh en
the rec ipi en ts of a co mp d en su res tha t the fre ed om is pre ser ve
fin iti on an ces, of
of the fre e so ftw are de
Th is is dis tin ct fro m pe rm iss ive free so ftw are licen
de d.
the wo rk is ch an ge d or ad
s are the sta nd ard ex am ple s.
Which the BS D lic en ce L) is a mo dif ied , mo re pe rm
iss ive ve rsi on
ral Pu bli c Lic en se (L GP Free
The GN U Le sse r Ge ne
for so me so ftw are lib rar ies . Th ere is als o a GN U
en de d cu me nta tio n of
of the GP L, ori gin all y int s ori gin all y int en de d for us e wi th do
wh ich wa
Do cu me nta tio n Lic en se,
en ad op ted for oth er us es.
GNU so ftw are , bu t ha s als o be NU AG PL ) is a sim ila r lic en se
wi th a focus on
Pu bli c Li ce ns e (G bli c License,
The Af fer o Ge ne ral U AG PL is sim ila r to the GN U Ge ne ral Pu
. Th e GN ,
networking se rv er so ftw are us e of the so ftw are ov er a co mp ute r ne tw ork
co ve rs the the AG PL ed
excep t tha t it ad dit ion all y be ma de av ail ab le to an y ne tw ork us er of
ur ce co de
re9ltiring the co mp let e so
:~n

work. For example, a web application.
The Free Software Foundati on recomme nds that this license be considered for any
software that will be common ly run over the network.

Berkel ey Softwa re Distdh ution (BSD)


Berkeley Software Distribu tion (BSD, sometim es called Berkeley Unix) is the Unix
operatin g system derivativ e develope d and distribut ed by the Comput er Systems
Research Group of the University of California, Berkeley .
Historically, BSD has been consider ed a branch of
UNIX - "BSD UNIX", because it shared the initial OPERATING SYSTEM
code base and design with the original AT&T UNIX
operatin g system. Today, the term of "BSD" is often
non-specifically used to refer to any of these BSD Berkeley Softwar
descend ants, e.g. FreeBSD, NetBSD or OpenBSD, Distribut ion
which together form a branch of the family of Unix-
like operatin g systems.

SPAM:
Sometim es, when you connect to a website and open
your e-mail account, you may find that a number
of unwante d mails have come into your inbox.
Sometim es, the titles of these message s are very
fascinating. In fact, these titles compel you to read
the mail/ message . These unwante d message s in the
mailbox are called Spam. It is an attempt to force the
message s on to people who would otherwis e not
choose to receive it. Most spams contain commercial advertisi ng, dubious products or
get-rich- quick schemes . Spam costs the sender very little but the user a lot.
These unwante d message s not only waste the valuable time of the users but also occupy
memory space of the system. Some people also send viruses through these message s and
try to corrupt the compute r systems.

Ways to stop Spam


You know that spam may cause serious problem s to your system. However , we can stop
the spam by installing a good antivirus software (also known as filters) in our compute r
system. Some useful filters are Spam Attack, Spam Hater, etc.
Moreover, as far as possible, try to avoid reading e-mail message s from unrecognised
senders and delete them instead. It saves your compute r from different types of viruses.

CYBER CRIME
In today's world, crimes are increasin g exponen tially
day by day in all the various fields. In the same way,
crimes are also prevalen t in the field of compute rs.
Althoug h, there are various types of compute r-related
crimes that are widespre ad, online criminal activities
such as illegal copying of software , compute r viruses,
stealing of hardwar e data, etc. continue to affect
compute r systems worldwi de. Thus, the online crime
that involves a compute r and a net-work , is known
as Cylicr Crime.
In addition to cyber-crime, there is also 'Comput er Supporte d Crime' which refers to
1111111111
,.,,'/Ye of co1nputers by criminals f
tlt ' ll~ or commurucati
JJ~,1 storage . on and documentation as well as

\'B£R L.\\\'~
Crtth ,the invention of the Internet, the
'°'
v-7or
Id has come on a common platform
.
· ere peop 1e can commurucate with
:ch other through . the cyber space.
'fhi5 ~ a revolutionary _s te~ for
uinaruty but also poses a significant
heed for the regulation of cyber
fl tt\rities. India became the 21 st nation
ac = - -:..._-:.;:_~~~.1JJ1 ~

. the world to adopt a cyber-law regrm·e · th


ll1 · th Inf . m e year 2000 Th t ,
contained m e ormation Technology Act 2000 Th · e c~un ry s cyber laws are
clearance from both the houses of the Parli · . e Act came mto effect after getting
Technology) received the assent of the Presid~en; Inmdi~~y 2000. The Bill (Information
en ° a m August 2000 as IT Act 2000.
Advantages of C) her La\.vs
It is important to understand what the IT A t 2000 ff • .
Th IT Act 2000 tt c o ers and what its various perspectives
are. . e. ~ ~mpts to change outdated laws and provides wa s to deal with
cyber-cnmes.
h The b asic idea of this law is to brm
· g the peop 1e on a common
y p 1atform
so ~h~t t ey c~n ma~e transactions over the Internet through credit/ debit cards without
their. mforma:1on . bemg ~used. The Act offers a much-needed legal framework and
that inf~rmation is not derued enforceability on the ground, which it is in the form of
electroruc records.
In view of the growth in transactions and communications carried out through electronic
records, .th.e Act ~e~ks to empower government departments in accepting, filing, creating
and retammg official documents in the digital format. The Act has also proposed a legal
framework for the authentication of the origin of electronic records/communication
through digital signatures. Some of them are mentioned as under:
• From the perspective of e-commerce in India, the IT Act 2000 and its provisions
contain many positive aspects. Firstly, the implications of these provisions for
the e-business would be that e-mails would now be a valid and legal form of
communication in our country, that can be duly produced and approved in the
court of law.
• Companies shall now be able to carry out electronic commerce using the legal
infrash·ucture provided by the Act.
• Digital signatures have also been given legal validity and sanction in the Act.
• The Act throws open the doors for the entry of corporate companies in the business
of being certifying authorities for issuing Digital Signature Certificates.
• The Act now allows the Government to issue notifications on the web, thus heralding
e-govemance.
• The Act enables companies to file any form, application or any other doc~ent
wi th an y office, authority, body or agency owned or c~ntrolled by the approp~iate
Government in electronic form by means of such electroruc form, as may be prescribed
by the appropriate Government office. . ..
• The IT Act also addresses the important issues of security w~c~. are critical to the
success of electronic transactions. The Act has given a legal definition to the concept
of secure digital signa tures that would be required, to have been passed through a
~ystem o f security procedures, as stipulated by the Government at a later date.
• L'nder the IT Act, 2000, it shall n ow be possible for corporates to have a statutory
· case anyone
remedy m · · computer sys t s or networks and causes
breaks mto their em f
.
damage or copies data. The remedy provide . d b y th e Act · in the form o monetary
is
damages not exceeding ~ 1 crore. . .
Although Internet is . very useful . . informa ti' on orldwide but it 1s a1so a
m shanng w ' .
concern that' cyber cnme
. may create problems for you, you~ family . and the soe1ety
fu you
· s · b d k · ·
live m. o, it must e use , eepmg its posi ve app 1ca
'ti' 1· ti'ons m mmd for a better ture.

NETIQUETTE
When you are working in an Internet environment, then
it is expected by the people or the society around this
environme nt to work under a set of rules. Thus, the term
'Netiquette' comes into play which is a combination of the
words 'network' and 'etiquette'. So, 'Netiquette' is defined
as a set of rules for acceptable online behaviour. It also
focuses on online ethics and governs by the acceptable
use of online resources in an online social environment.
Moreover, the concept of a 'netizen' is also involved
in this environment. It is derived from the words
'Internet' and 'citizen'. It is referred to as a person who
uses the Internet to participate in the society and an
individual who has accepted the responsibility of using the Internet in a productiv e and
a socially responsible way.
Internet etiquette(Netiquette) simply means the use of good
manners in online communication such as e-mail, blogs and social
networking sites. It is important to emphasize netiquette because it
defines the online communication as well as the non-verbal ways. In
this type of communication, one is unable to see the facial expressions,
body language, etc. as a result of which the messages can often be
misinterpreted. By following netiquette, these types of problems can
be overcome and a healthy environme nt can be established. It also
ensures the use of correct spelling, grammar punctuatio n including
the use of emoticons (such as:):(;) and others) to explain an emotion.
Applying online ethics and being a good netizen means being responsibl e and showing
respectful behaviour online. Sometimes, people may fail to realise the social values in
any environme nt including the Internet. The following points will certainly help you to
understan d Internet etiquette and make your online experience more enjoyable. They are:
1. The term 'Shouting' states that you are never to type in all capital letters. The people
may not like it when you shout at them on the net.
2. When you borrow something from someone, give them the credit. It may be the name
of a site or any similar kind of informatio n that you may have forgotten.
3. Avoid un-necessary gossiping and keeping personal informatio n online. This can save
you from an unpleasan t situation online.
4. Never try to steal photograp hs off the web, even if they are a perfect fit for what you
need.
5. Be patient with the new online learners, realising that they are just learning like you
did once upon a time.
6. Spam is an unwanted electronic message, so sending the same electronic message
over the Internet is unwanted . It can get you into a lot of trouble on some sites.
r 7. fhde keep your Intern
.
excess use of emoti cons tend to irritat e
et conne ctions hap peodp
1
e. So, avoid overu se of emoticons
health y b 11 .
a11 PY an
Y a owing more social
irlteractions.

fBER SECURITY
C the world of Intern. et,. it is a matte r of great concer n for all of t
111
cybercrime or simila r attack s. So, the d at b us, 0 protec t our data
a muSt e secure d from gettin g into the
v•
fro~s of unaut horise d acces s.
ha!\ . d fin d Jr
'Cyber Security l S e e as a set of techniques
I •

used to protect the integr ity of netwo rks, progr ams ~


d data from attack , dama ge or unaut horise d
:cess. It is neede d in order to ~r~ve ~t explo itation s ii(
or as a safety meas ure to mnun uze cybercrime . 1J .
'[his security cover s the follow ing areas:
1. Application Secur ity: It invol ves the measu res
that are taken durin g the devel opme nt. It
protects the applic ations from threat s that can
come throu gh desig n, devel opme nt, upgra de or maint enanc e.
d access to avoid
2. Information Secur ity: It protec ts inform ation from unaut horise
like Identification,
theft ~d ~o prote ct the privacy. It involv es certai n techn iques
authentication, autho rizati on and Crypt ograp hy.
3. Netwo rk Secur ity: It includ es activities to protec t the usabil
ity, reliability and safety
irus, anti-s pywar e,
of the netwo rk. The netwo rk secur ity comp onent s includ e Anti-v
Privat e Netw orks (to
Firewall (to block unaut horis ed access to your netwo rk), Virtual
provid e secur e remo te access), etc.

PHIS HING
In the cyber -worl d, phishi ng (also know n as cardin g and spoofi
ng) is a form of illegal act
passw ords and credit
whereby fraud ulentl y sensit ive inform ation is acquired, such as
perso n or busin ess
card detail s, by a perso n/ entity, masq uerad ing as a trustw orthy
e-mail or instan taneo us
in an appar ently official electr onic comm unica tion, such as an
comm unica tion.

Indic ation of Phis hing Atte mpts


If an e-mai l addre sses a user in a generic fashio n (Dear eBay
memb er), it is likely to be
an attem pt at phish ing.
• The appea rance of links in the messa ge
For example, the link could be http:/ /www .goog le.com @mem
berthi nkban k.com / may
on www. googl e.
deceiv e a casua l obser ver into believ ing that the link will open a page
memb erthin kbank .
com, where as the link actua lly directs the brows er to a page on
com.
• Cross site script ing
have to verify
In this attack metho d, users may receive a messa ge sayin g that they
~ebsi t~. In reality,
their accou nt, by follow ing a link to what appea rs to be an authe ~tic
1s manip ulated to
the link is forge d, altho ugh it is very difficult to spot that the link
perpe trate this attack .

Anti Phis hing Initi ative s


includ in? ~rafti ng of
~ ~e. are variou s strate gies being adopt ed to comb at phish ing,
Peci.f1c legisla tion and devis ing of specia l techn ology target ed
to tackle phish ing.
in g str at eg ies
Te ch no log y ba se d an ti- ph ish ing attempts. . . .
ide nti fy an d de al wi th ph ish
1. Training users to gra ms wo rk by ide nh fy mg phishing
tw are pro gra ms . Th e pro
2. Use of anti-phishing sof
s.
contents on websites and e-mail
users from phishers
3. Use of Spam filters protects rif ication tools like challenge quest
ions,
ha ve int rod uc ed un iqu e ve
4. Some organisations
im ag es wh ich ser ve the pu rpo se of a verification pa ssw ord .
secret

Co nc lu sio n d of co mm itt ing on lin e finan cia


l fraud.
d of cy be r crin1 e an d a me tho
Phishing is a ne w kin co mm un icating pe rso na l or confidenti
al data
h ris k inv olv ed in
It demonstrates the hig or ide nti ty ca rd nu mb ers, via the Interne;
dit car d nu mb ers
su ch as account numbers, cre t.
ing cer tai n tha t the act ua l ad dressee is one's familiar or no
wi tho ut be olo gy ba se d an ti phishing
t rel iab le an d sec ure tec hn
Therefore, it is advised to ad op ng an d de ali ng wi th ph ish ers . Let us
take
a~ are ne ss on ide nti fyi
tools, inc lud ing general In ter ne t us ers an d de ter fro m comittin
g
, in the int ere st of
a ~o ~e towards. anti-phishing
ph ish ing or on line frauds.

You might also like