Unit 3: Cyber Ethics

1. Netiquettes

Definition:
Netiquette is a combination of “network” and “etiquette”. It refers to the correct or acceptable way of communicating on the Internet.

Key Netiquettes:

  1. Be respectful โ€“ Avoid offensive language, bullying, or trolling.
  2. Think before you post โ€“ Avoid posting anything you might regret later.
  3. Avoid spamming โ€“ Do not send unsolicited messages or links.
  4. Use proper language and grammar โ€“ Communicate clearly and politely.
  5. Respect others’ privacy โ€“ Do not share private info without consent.
  6. Do not plagiarize โ€“ Give credit when using others’ work or ideas.
  7. Avoid typing in ALL CAPS โ€“ It’s considered shouting.
  8. Be careful with humor and sarcasm โ€“ It can be misinterpreted.

Example:
Using โ€œpleaseโ€ and โ€œthank youโ€ in an email shows netiquette and professionalism.


2. Software Licenses and the Open Source Software Movement

A. Software License

A legal agreement that governs the use or redistribution of software.

Types of Software Licenses:

  1. Proprietary License โ€“ Users buy the right to use the software but cannot modify or share it.
    • Example: Microsoft Office
  2. Freeware โ€“ Free to use but source code is not available.
    • Example: Adobe Acrobat Reader
  3. Shareware โ€“ Free trial with limited features; full version must be purchased.
    • Example: WinRAR
  4. Open Source License โ€“ Free to use, modify, and distribute.
    • Example: Linux, LibreOffice

B. Open Source Software Movement

A global initiative promoting software with open-source code, encouraging collaboration and sharing.

Benefits:

  • Free access
  • Transparency
  • Customization
  • Community support

Popular Open Source Software:

  • Linux (OS)
  • LibreOffice (Office suite)
  • Mozilla Firefox (Browser)

3. Intellectual Property Rights (IPR), Plagiarism, and Digital Property Rights

A. Intellectual Property Rights (IPR):

Legal rights given to creators for their creations. It includes:

  • Copyright โ€“ For books, music, software
  • Trademark โ€“ For brand names/logos
  • Patent โ€“ For inventions

Purpose:
To protect the original creatorโ€™s work from unauthorized use.

B. Plagiarism:

Using someone else’s work or ideas without giving them credit.

Examples:

  • Copying text from a website without citation
  • Submitting someone elseโ€™s project as your own

C. Digital Property Rights:

Rights that protect the ownership and use of digital content like:

  • Music
  • Videos
  • Software
  • eBooks

Protection Methods:

  • Digital Rights Management (DRM)
  • Watermarking

4. Freedom of Information and the Digital Divide

A. Freedom of Information (FoI):

The right to access information held by public authorities.

Importance:

  • Promotes transparency
  • Ensures accountability
  • Helps in informed decision-making

Indiaโ€™s FoI Act:
Right to Information (RTI) Act, 2005 allows citizens to request information from government bodies.

B. Digital Divide:

The gap between individuals who have access to modern digital technology and those who do not.

Causes:

  • Economic inequality
  • Poor infrastructure
  • Lack of education

Impact:

  • Unequal opportunities in education, employment, and communication

Bridging the Divide:

  • Affordable internet
  • Digital literacy programs
  • Government initiatives like Digital India

5. E-Commerce: Privacy, Fraud, and Secure Data Transmission

A. E-Commerce (Electronic Commerce):

Buying or selling of goods and services using the internet.

Examples:

  • Amazon, Flipkart (Online Shopping)
  • Paytm, PhonePe (Online Payments)

B. Privacy in E-Commerce:

Protecting customersโ€™ personal and financial data such as:

  • Name, address, phone number
  • Credit/debit card details

Measures:

  • SSL encryption
  • Privacy policies
  • User authentication

C. Online Fraud:

Illegal activities performed online to cheat users.

Types of Fraud:

  • Phishing (fake emails)
  • Identity theft
  • Fake websites or apps

Prevention:

  • Use strong passwords
  • Avoid suspicious links
  • Use verified websites

D. Secure Data Transmission:

Ensuring safe exchange of information over the internet.

Techniques:

  • Encryption โ€“ Converts data into unreadable form
  • HTTPS โ€“ Secure version of HTTP
  • Two-factor Authentication โ€“ Extra layer of security

Summary Table

TopicDescriptionExamples
NetiquettesOnline communication rulesAvoid spamming, be respectful
Software LicensesLegal terms of software useFreeware, Open Source
Open SourceFree and modifiable softwareLinux, Firefox
IPR & PlagiarismLegal rights and ethical use of contentCopyright, Avoiding copy-paste
Freedom of InfoRight to access public dataRTI in India
Digital DivideTechnology access gapUrban vs Rural areas
E-CommerceOnline buying/sellingAmazon, Paytm
Privacy & FraudProtecting user dataHTTPS, Encryption

Important Questions for Practice

  1. What are netiquettes? List any four.
  2. Differentiate between freeware and open-source software.
  3. Explain the concept of plagiarism with an example.
  4. What is the digital divide and how can it be reduced?
  5. How is secure data transmission ensured in e-commerce?
  6. Define intellectual property rights and why they are important.
  7. Explain phishing with an example.