0% found this document useful (0 votes)
14 views1 page

Adobe Scan 09-Sept-2024

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views1 page

Adobe Scan 09-Sept-2024

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

LESSON

9 Cyber Ethics
LEARNING IN THIS CHAPTER
Computing Ethics Safety Measures while Using Computer and the Internet
Unethical Practices Digital Footprints

The internet has


become an essential part of modern life. It is a global system of interconnected computer networks
iabies the users to share information and various resOurces with each other. It has several advantages for
Ncua.However, it is atool, which must be handled with caution, as its misuse can be hazardous.
COMPUTING ETHICS
ctnics is a set of moral principles that governs the behaviour of agroup or an
individual. similarly, computingethics is
setorprocedures,moral principles, and ethical practices that regulates the use ofa computer. It focuses onethical
implementation and use of computing resources, and includes new issues that are raised by new
basically aims at encouraging IT users to be responsible in order to utilise the technologies. It
the views of others, and acknowledge the technology tools judiciously, respect
rights and properties of the people onthe internet.
Some of the common ethical guidelines that should
befollowed while using a computerare as follows:
Do not use computertechnology to cause
disruption or interference in other users' work.
Donotspy on another person's computer data.
Do not use computer technology to steal information.
Do not contribute to the spreadof wrong
information using computertechnology.
Avoid buying pirated software. Payfor software unless it is free.
Donot use someone else's computer resourceswithout an authorisation.
Itis wrong to claim ownership on awork, which is the output of
someone else's intellect.
Before developing software, think about the social impact it can have.
Re respectfuland courteous with the fellow members while communicating onthe internet

UNETHICAL PRACTICES
Some ofthe common unethical practices that are prevalent in the society are discussed as fallo..

PLAGIARISM
imitation of the language and thoughts of
Plagiarismis the usage or own original work..It is considered a
as one's
another person projected
crime orfraudulentact.
follows:
descritbes 'plagiarism'as
Merriam-WebsterDictionary
The one'sown.
(ideas orwordsofanother)as
off
tostealand pass 122

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy