Computer Applications Unit 3 Cyber Ethics

In today’s digital world, ethics and responsible behavior on the internet are just as important as technical knowledge. Cyber Ethics refers to the rules, principles, and moral values that guide how individuals should behave while using technology and the internet.
This unit covers Netiquettes, Software Licenses, Intellectual Property Rights, Digital Divide, and E-commerce Issues. Let’s go through each in detail.
1. Netiquettes
Netiquette = Internet + Etiquette
It means the proper and polite way of communicating and behaving online.
Key Points:
- Be respectful in emails, chats, and social media.
- Avoid trolling, abusive language, or spamming.
- Do not type in ALL CAPS (it looks like shouting).
- Respect others’ privacy – do not share personal information without consent.
- Give credit when you share someone else’s content.
Example: Writing “Thank you for your help 🙂” in an email is good netiquette. Posting hateful comments online is bad netiquette.
2. Software Licenses and the Open Source Movement
Software is not free to use unless the license allows it. A software license defines how a program can be used, copied, modified, or distributed.
Types of Software Licenses:
- Proprietary Software – Paid, closed-source. (e.g., Microsoft Office, Adobe Photoshop)
- Freeware – Free to use but cannot be modified. (e.g., Skype, Google Chrome)
- Shareware – Free trial version, but payment required for full use.
- Open Source Software – Source code is freely available, can be modified and shared. (e.g., Linux, Mozilla Firefox, LibreOffice)
Open Source Movement:
A global initiative that promotes free access to software code so that anyone can improve and share it. It encourages collaboration, transparency, and innovation.
3. Intellectual Property Rights (IPR), Plagiarism, and Digital Property Rights
Intellectual Property Rights (IPR):
Legal rights given to creators of original work (like software, music, books, inventions) to protect their ideas and prevent misuse.
- Copyright – Protects books, songs, software, movies.
- Patent – Protects inventions.
- Trademark – Protects brand logos/names (e.g., Nike’s swoosh logo).
Plagiarism:
Copying someone else’s work (text, code, image, idea) without giving credit is plagiarism. It is unethical and often illegal.
Digital Property Rights:
They ensure that creators’ digital content (e.g., eBooks, videos, apps, music) is protected against illegal downloads, piracy, and misuse.
4. Freedom of Information and the Digital Divide
Freedom of Information:
- Every individual has the right to access information on the internet, provided it does not harm security or privacy.
- Promotes transparency and helps in education, research, and decision-making.
Digital Divide:
- The gap between people who have access to digital technology (internet, smartphones, computers) and those who do not.
- Causes: Economic issues, lack of infrastructure, and education.
- Bridging the gap: Government initiatives like Digital India, affordable internet, rural internet projects.
5. E-commerce: Privacy, Fraud, and Secure Data Transmission
E-commerce = Buying and selling of goods/services online (Amazon, Flipkart, Paytm).
Concerns:
- Privacy – Personal and financial details (like Aadhaar, bank account, card numbers) must be protected.
- Fraud – Fake websites, phishing emails, and online scams can trick users into giving sensitive data.
- Secure Data Transmission –
- Use HTTPS websites for secure browsing.
- Encryption ensures that data is protected while being transferred.
- Digital certificates and OTP (One-Time Password) add security.
Quick Revision Points
- Netiquettes = Online manners.
- Software Licenses = Rules of using software.
- Open Source = Free to modify & share.
- IPR = Protects creators’ rights.
- Plagiarism = Copying without credit.
- Digital Divide = Tech gap between rich & poor.
- E-commerce Risks = Privacy issues, fraud, need for encryption.
Conclusion
Cyber ethics teaches us to use technology responsibly, respect digital rights, and stay safe online. As students and future professionals, understanding these concepts is essential not only for exams but also for being a responsible digital citizen.
Case Study Based Questions – Unit 3: Cyber Ethics
Case Study 1: Netiquettes
Ravi created a WhatsApp group for his class. Some students started posting memes and offensive jokes. One student typed in ALL CAPS to argue with another, while another shared a friend’s personal photo without permission.
Later, the teacher scolded Ravi for not maintaining discipline in the group.
Q1. Which cyber ethics rule was violated by typing in ALL CAPS?
👉 Ans: Typing in all caps is considered shouting online and breaks the rule of netiquette.
Q2. Sharing a personal photo without permission violates which principle?
👉 Ans: It violates privacy and digital property rights.
Q3. What should Ravi have done as the group admin?
👉 Ans: He should have set rules for polite communication and removed/ warned those violating netiquettes.
Case Study 2: Software Licenses
Ritu downloaded Microsoft Office from a pirated website because she did not want to pay. Her friend advised her to use LibreOffice, which is free and open source.
Q1. Which unethical practice did Ritu do?
👉 Ans: She used pirated software, which is illegal.
Q2. Why is LibreOffice considered open-source software?
👉 Ans: Because its source code is freely available, and users can use, modify, and share it legally.
Q3. Write one difference between proprietary and open-source software.
👉 Ans: Proprietary software is paid and closed (e.g., Microsoft Office), whereas open-source is free and modifiable (e.g., LibreOffice).
Case Study 3: Intellectual Property & Plagiarism
A student prepared a project report for Computer Applications. Instead of writing his own content, he copied paragraphs from Wikipedia and pasted images from Google without mentioning sources.
Q1. What unethical practice did the student do?
👉 Ans: He committed plagiarism by copying without giving credit.
Q2. Mention one way to avoid plagiarism.
👉 Ans: Use proper citations and references when using information from other sources.
Q3. Copying without permission violates which right?
👉 Ans: It violates Intellectual Property Rights (IPR).
Case Study 4: Digital Divide
In a village, students find it difficult to attend online classes because they do not have smartphones or internet access, while students in the city easily attend classes on Zoom and Google Meet.
Q1. What problem are the village students facing?
👉 Ans: They are facing the Digital Divide – lack of access to digital technology.
Q2. Suggest one way the government can reduce the digital divide.
👉 Ans: Provide low-cost internet plans and set up digital learning centers in rural areas.
Q3. Which initiative by the Indian Government aims to reduce the digital divide?
👉 Ans: Digital India programme.
Case Study 5: E-commerce
Meena wanted to buy a phone online. She visited a website that looked like Amazon but was actually fake. She entered her credit card details, and later her money was stolen.
Q1. What kind of fraud did Meena face?
👉 Ans: She faced an online fraud (phishing website scam).
Q2. How could Meena have identified a secure website?
👉 Ans: By checking for HTTPS and a lock symbol in the address bar.
Q3. Which technology ensures safe data transfer during online payments?
👉 Ans: Encryption.
✅ These case studies cover all important subtopics:
- Netiquettes
- Software licenses
- IPR & Plagiarism
- Digital Divide
- E-commerce security