Unit 3: Cyber Ethics
1. Netiquettes
Definition:
Netiquette is a combination of “network” and “etiquette”. It refers to the correct or acceptable way of communicating on the Internet.
Key Netiquettes:
- Be respectful โ Avoid offensive language, bullying, or trolling.
- Think before you post โ Avoid posting anything you might regret later.
- Avoid spamming โ Do not send unsolicited messages or links.
- Use proper language and grammar โ Communicate clearly and politely.
- Respect others’ privacy โ Do not share private info without consent.
- Do not plagiarize โ Give credit when using others’ work or ideas.
- Avoid typing in ALL CAPS โ It’s considered shouting.
- Be careful with humor and sarcasm โ It can be misinterpreted.
Example:
Using โpleaseโ and โthank youโ in an email shows netiquette and professionalism.
2. Software Licenses and the Open Source Software Movement
A. Software License
A legal agreement that governs the use or redistribution of software.
Types of Software Licenses:
- Proprietary License โ Users buy the right to use the software but cannot modify or share it.
- Example: Microsoft Office
- Freeware โ Free to use but source code is not available.
- Example: Adobe Acrobat Reader
- Shareware โ Free trial with limited features; full version must be purchased.
- Example: WinRAR
- Open Source License โ Free to use, modify, and distribute.
- Example: Linux, LibreOffice
B. Open Source Software Movement
A global initiative promoting software with open-source code, encouraging collaboration and sharing.
Benefits:
- Free access
- Transparency
- Customization
- Community support
Popular Open Source Software:
- Linux (OS)
- LibreOffice (Office suite)
- Mozilla Firefox (Browser)
3. Intellectual Property Rights (IPR), Plagiarism, and Digital Property Rights
A. Intellectual Property Rights (IPR):
Legal rights given to creators for their creations. It includes:
- Copyright โ For books, music, software
- Trademark โ For brand names/logos
- Patent โ For inventions
Purpose:
To protect the original creatorโs work from unauthorized use.
B. Plagiarism:
Using someone else’s work or ideas without giving them credit.
Examples:
- Copying text from a website without citation
- Submitting someone elseโs project as your own
C. Digital Property Rights:
Rights that protect the ownership and use of digital content like:
- Music
- Videos
- Software
- eBooks
Protection Methods:
- Digital Rights Management (DRM)
- Watermarking
4. Freedom of Information and the Digital Divide
A. Freedom of Information (FoI):
The right to access information held by public authorities.
Importance:
- Promotes transparency
- Ensures accountability
- Helps in informed decision-making
Indiaโs FoI Act:
Right to Information (RTI) Act, 2005 allows citizens to request information from government bodies.
B. Digital Divide:
The gap between individuals who have access to modern digital technology and those who do not.
Causes:
- Economic inequality
- Poor infrastructure
- Lack of education
Impact:
- Unequal opportunities in education, employment, and communication
Bridging the Divide:
- Affordable internet
- Digital literacy programs
- Government initiatives like Digital India
5. E-Commerce: Privacy, Fraud, and Secure Data Transmission
A. E-Commerce (Electronic Commerce):
Buying or selling of goods and services using the internet.
Examples:
- Amazon, Flipkart (Online Shopping)
- Paytm, PhonePe (Online Payments)
B. Privacy in E-Commerce:
Protecting customersโ personal and financial data such as:
- Name, address, phone number
- Credit/debit card details
Measures:
- SSL encryption
- Privacy policies
- User authentication
C. Online Fraud:
Illegal activities performed online to cheat users.
Types of Fraud:
- Phishing (fake emails)
- Identity theft
- Fake websites or apps
Prevention:
- Use strong passwords
- Avoid suspicious links
- Use verified websites
D. Secure Data Transmission:
Ensuring safe exchange of information over the internet.
Techniques:
- Encryption โ Converts data into unreadable form
- HTTPS โ Secure version of HTTP
- Two-factor Authentication โ Extra layer of security
Summary Table
Topic | Description | Examples |
---|---|---|
Netiquettes | Online communication rules | Avoid spamming, be respectful |
Software Licenses | Legal terms of software use | Freeware, Open Source |
Open Source | Free and modifiable software | Linux, Firefox |
IPR & Plagiarism | Legal rights and ethical use of content | Copyright, Avoiding copy-paste |
Freedom of Info | Right to access public data | RTI in India |
Digital Divide | Technology access gap | Urban vs Rural areas |
E-Commerce | Online buying/selling | Amazon, Paytm |
Privacy & Fraud | Protecting user data | HTTPS, Encryption |
Important Questions for Practice
- What are netiquettes? List any four.
- Differentiate between freeware and open-source software.
- Explain the concept of plagiarism with an example.
- What is the digital divide and how can it be reduced?
- How is secure data transmission ensured in e-commerce?
- Define intellectual property rights and why they are important.
- Explain phishing with an example.