SlideShare a Scribd company logo
3
Most read
4
Most read
8
Most read
COMPUTER APPLICATIONS
CLASS X (Code 165)
TOPIC:
UNIT 3: Cyber Ethics
By
HIMANSHU PATHAK
Contents
• Introduction
• Cyber Ethics
• Netiquettes
• Rules of Netiquettes
• Software Licenses
– Closed Source Software
– Open-source Software
– Free Software
Introduction
• Ethics is the classic sense refers to the rules and
standards governing the conduct of an individual
with others.
• Need: In order to keep the healthy environment in
computer room, to make good relation with the co-
workers and to improve the working efficiency, some
basic ethics are necessary.
• Computer ethics is a concept in ethics that addresses
the ethical issues and constraints that arise from the
use of computers, and how they can be prevented.
Cyber Ethics
• Cyber means electronic communication
networks.
• Ethics is a system of moral principles.
• Cyber ethics is the study of ethics pertaining to
computers, covering user behavior and what
computers are programmed to do.
• In other way, Cyber Ethics is the conduct of
acceptable usage of online resources by a user.
Cont…
• The main issues that surround cyber ethics are:
Copyright/Downloading, Hacking and Cyber bullying.
• These three issues are increasing daily and mostly
due to children using the internet improperly.
• Copyright/Downloading has become a major
problem which allow users to download music,
programs and videos for free.
• Hacking is the intentional damage that a person
inflicts onto another computer or computer network.
• Cyber bullying is bullying that takes place carrying
electronic technology.
Netiquettes
• Netiquettes is a set of rules for acceptable online
behavior.
• It is made by combining the words ‘network’ and
‘etiquette’, thus it is also known as Internet
Etiquette.
• It means the use of good manners in online
communication such as e-mails, forums, blogs and
social networking sites etc.
• In other words, Netiquettes means, we should
be ethical, respectful and responsible while surfing
the Internet.
Cont…
• Ethical means we should share our information and
expertise online without any copyright violations.
• We need to be responsible means we should not
indulge in any insulting, degrading or intimidating
online behavior which is Cyber Bullying.
• We should not encourage trolls by giving attention
to them.
• Respectful means we should respect other people’s
privacy and the freedom of personal expression.
Rules of Netiquette
• Some of the netiquettes are mentioned as under:
– Don’t backbite
– Don’t plagiarize
– Thank people who help you
– Verify facts before reposting
– Don’t overuse the emotions
– Respect other people's privacy
– Don’t express offensive opinions
– Don’t type only in capital letters
– Don’t send unwanted spam messages
– Check messages and respond promptly
– Don’t post private or embarrassing images or comments
Software Licenses
• License is permission granted by the holder of a
copyright to another to use an original work.
• A software license is a document that provides
details regarding the use and distribution of
software.
• They either prohibit or provide end users with
the right to make copies of the software.
• They classified as proprietary/ closed source,
open source software and freeware/ free
software.
Proprietary/ Closed Source Software
• Proprietary software, you need to purchase the license
and features are unlocked only after you purchase the
software.
• Proprietary software remains the property of its
owner/creator and is used by end-users / organizations
under predefined conditions.
• Proprietary software may also be called closed-source
software or commercial software.
• It is paid software for which the software publisher retains
intellectual property rights.
• Some examples of Proprietary software includes
Windows, MacOS, Internet Explorer, Google earth,
Microsoft Office etc.
Open-source Software
• The term Open Source refers to software in which
the source code is freely available for others to view,
amend, and adapt.
• It is free software in which the software publisher
releases the source code under a license.
• It grants permission to end users to redistribute
them and make modifications in the software.
• Some examples of Open source software includes
Android, Ubuntu, Firefox, Open Office etc.
Freeware/Free Software
• It is software that is available for free, but they are
still considered closed source or proprietary
software because their source code is not available
to the end user to make any modifications.
• Shareware is where the software is free only for
specified period, on only few features are available
for free. E.g. WinZip or MySQL.
• Then we have Freeware. These are software where
all features are available free for life. E.g. Yahoo
Messenger or Adobe PDF.
Open Source Software Movement
• The open-source-software movement is a
movement that supports the use of open-source
licenses for some or all software, a part of the
broader notion of open collaboration.
• It is a movement in which the source-code of
software is released to programmers in order to
make voluntary modifications and its distribution.
• Such movement lead to the development of
MediaWiki software through which Wikipedia
website is built.
Summary
• Cyber Ethics and Netiquettes.
• Software Licenses and their categories.
• In the next class, we will start Unit III – Cyber
Ethics: part 2 in detail.
•Thanks

More Related Content

PPT
Computer Ethics
PPT
Cyber Ethics
PPTX
computer ethics slides
PPT
Computer Ethics Presentation
PDF
Class 11 ca chapter 17 computer ethics and cyber crime
PPT
Ethics in using computer
PPTX
Cyber Law And Ethics
PPTX
Cyber ethics(CBSE Class X), Computer Application
Computer Ethics
Cyber Ethics
computer ethics slides
Computer Ethics Presentation
Class 11 ca chapter 17 computer ethics and cyber crime
Ethics in using computer
Cyber Law And Ethics
Cyber ethics(CBSE Class X), Computer Application

What's hot (20)

PDF
Ethical and Social Issues in ICT
DOCX
Cyber ethics
PPTX
Cyber crime
PPTX
Computer security & ethics
PPTX
Cyber crimes presentation
PPTX
Cyber ethics
PPTX
Computer ethics
PPTX
Cyber Crime and Security
PPTX
Cyber Crime
PPTX
Cyber security presentation
PPT
Cyber Crime and Security
PPTX
Computer Security and Ethics
PPTX
Internet ethics
PPTX
Computer security
PPTX
Presentation on Ethical Hacking ppt
PPTX
Computer Ethics
PPTX
Computer ethics & copyright
PPTX
Cyber Security
PPTX
CYBER SECURITY
PPTX
Computer ethics & copyright
Ethical and Social Issues in ICT
Cyber ethics
Cyber crime
Computer security & ethics
Cyber crimes presentation
Cyber ethics
Computer ethics
Cyber Crime and Security
Cyber Crime
Cyber security presentation
Cyber Crime and Security
Computer Security and Ethics
Internet ethics
Computer security
Presentation on Ethical Hacking ppt
Computer Ethics
Computer ethics & copyright
Cyber Security
CYBER SECURITY
Computer ethics & copyright
Ad

Similar to An Introduction to Cyber Ethics (20)

PPTX
Computer Ethics
PPTX
computer ethics.pptx
PPTX
Cyber Ethics and Netiquettes in Government Sector.pptx
PPTX
computerethics-131031090048-phpapp02.pptx
PPTX
ComputingEthics.pptx
PPT
The Computer Ethics in using a computer .
PPT
COMPUTER ETHICS AND SECURITY
PPTX
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PPTX
Computer ethics cyber security and technology of it
PPT
4.1.1 areas of computer ethics
PPTX
Ethics - Lesson on IT Ethics Netiquettes.pptx
PPTX
Chapter 1-introduction to ict
PDF
Nfwordle
PPTX
PPTX
why ethics computer ethics 10 commandments.pptx
PPTX
COMPUTER ETHICS
PPTX
week43thicsindatasciencetohellopeir.pptx
PPT
Computer ethics-presentation-1221139444034074-9
PPTX
Computer Science – societal impact.pptx
PPTX
Law 483 cyberethics
Computer Ethics
computer ethics.pptx
Cyber Ethics and Netiquettes in Government Sector.pptx
computerethics-131031090048-phpapp02.pptx
ComputingEthics.pptx
The Computer Ethics in using a computer .
COMPUTER ETHICS AND SECURITY
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
Computer ethics cyber security and technology of it
4.1.1 areas of computer ethics
Ethics - Lesson on IT Ethics Netiquettes.pptx
Chapter 1-introduction to ict
Nfwordle
why ethics computer ethics 10 commandments.pptx
COMPUTER ETHICS
week43thicsindatasciencetohellopeir.pptx
Computer ethics-presentation-1221139444034074-9
Computer Science – societal impact.pptx
Law 483 cyberethics
Ad

More from Himanshu Pathak (18)

PPTX
Introduction to E commerce
PPTX
Digital property rights
PPTX
Intellectual property rights
PPTX
Cascading style sheet part 2
PPTX
Cascading style sheet an introduction
PPTX
Html multimedia
PPTX
Html forms
PPTX
Html tables
PPTX
Html link and list tags
PPTX
HTML Text formatting tags
PPTX
Basic html tags
PPTX
Introduction to html
PPTX
Mobile technologies
PPTX
Web services
PPTX
Remote Login and File Transfer Protocols
PPTX
Internet protocol
PPTX
Introduction to internet
PPTX
What is Computer?
Introduction to E commerce
Digital property rights
Intellectual property rights
Cascading style sheet part 2
Cascading style sheet an introduction
Html multimedia
Html forms
Html tables
Html link and list tags
HTML Text formatting tags
Basic html tags
Introduction to html
Mobile technologies
Web services
Remote Login and File Transfer Protocols
Internet protocol
Introduction to internet
What is Computer?

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Classroom Observation Tools for Teachers
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Pre independence Education in Inndia.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Institutional Correction lecture only . . .
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
RMMM.pdf make it easy to upload and study
Renaissance Architecture: A Journey from Faith to Humanism
Classroom Observation Tools for Teachers
Week 4 Term 3 Study Techniques revisited.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Supply Chain Operations Speaking Notes -ICLT Program
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Anesthesia in Laparoscopic Surgery in India
Pre independence Education in Inndia.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
Institutional Correction lecture only . . .
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPH.pptx obstetrics and gynecology in nursing
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
O7-L3 Supply Chain Operations - ICLT Program
Final Presentation General Medicine 03-08-2024.pptx

An Introduction to Cyber Ethics

  • 1. COMPUTER APPLICATIONS CLASS X (Code 165) TOPIC: UNIT 3: Cyber Ethics By HIMANSHU PATHAK
  • 2. Contents • Introduction • Cyber Ethics • Netiquettes • Rules of Netiquettes • Software Licenses – Closed Source Software – Open-source Software – Free Software
  • 3. Introduction • Ethics is the classic sense refers to the rules and standards governing the conduct of an individual with others. • Need: In order to keep the healthy environment in computer room, to make good relation with the co- workers and to improve the working efficiency, some basic ethics are necessary. • Computer ethics is a concept in ethics that addresses the ethical issues and constraints that arise from the use of computers, and how they can be prevented.
  • 4. Cyber Ethics • Cyber means electronic communication networks. • Ethics is a system of moral principles. • Cyber ethics is the study of ethics pertaining to computers, covering user behavior and what computers are programmed to do. • In other way, Cyber Ethics is the conduct of acceptable usage of online resources by a user.
  • 5. Cont… • The main issues that surround cyber ethics are: Copyright/Downloading, Hacking and Cyber bullying. • These three issues are increasing daily and mostly due to children using the internet improperly. • Copyright/Downloading has become a major problem which allow users to download music, programs and videos for free. • Hacking is the intentional damage that a person inflicts onto another computer or computer network. • Cyber bullying is bullying that takes place carrying electronic technology.
  • 6. Netiquettes • Netiquettes is a set of rules for acceptable online behavior. • It is made by combining the words ‘network’ and ‘etiquette’, thus it is also known as Internet Etiquette. • It means the use of good manners in online communication such as e-mails, forums, blogs and social networking sites etc. • In other words, Netiquettes means, we should be ethical, respectful and responsible while surfing the Internet.
  • 7. Cont… • Ethical means we should share our information and expertise online without any copyright violations. • We need to be responsible means we should not indulge in any insulting, degrading or intimidating online behavior which is Cyber Bullying. • We should not encourage trolls by giving attention to them. • Respectful means we should respect other people’s privacy and the freedom of personal expression.
  • 8. Rules of Netiquette • Some of the netiquettes are mentioned as under: – Don’t backbite – Don’t plagiarize – Thank people who help you – Verify facts before reposting – Don’t overuse the emotions – Respect other people's privacy – Don’t express offensive opinions – Don’t type only in capital letters – Don’t send unwanted spam messages – Check messages and respond promptly – Don’t post private or embarrassing images or comments
  • 9. Software Licenses • License is permission granted by the holder of a copyright to another to use an original work. • A software license is a document that provides details regarding the use and distribution of software. • They either prohibit or provide end users with the right to make copies of the software. • They classified as proprietary/ closed source, open source software and freeware/ free software.
  • 10. Proprietary/ Closed Source Software • Proprietary software, you need to purchase the license and features are unlocked only after you purchase the software. • Proprietary software remains the property of its owner/creator and is used by end-users / organizations under predefined conditions. • Proprietary software may also be called closed-source software or commercial software. • It is paid software for which the software publisher retains intellectual property rights. • Some examples of Proprietary software includes Windows, MacOS, Internet Explorer, Google earth, Microsoft Office etc.
  • 11. Open-source Software • The term Open Source refers to software in which the source code is freely available for others to view, amend, and adapt. • It is free software in which the software publisher releases the source code under a license. • It grants permission to end users to redistribute them and make modifications in the software. • Some examples of Open source software includes Android, Ubuntu, Firefox, Open Office etc.
  • 12. Freeware/Free Software • It is software that is available for free, but they are still considered closed source or proprietary software because their source code is not available to the end user to make any modifications. • Shareware is where the software is free only for specified period, on only few features are available for free. E.g. WinZip or MySQL. • Then we have Freeware. These are software where all features are available free for life. E.g. Yahoo Messenger or Adobe PDF.
  • 13. Open Source Software Movement • The open-source-software movement is a movement that supports the use of open-source licenses for some or all software, a part of the broader notion of open collaboration. • It is a movement in which the source-code of software is released to programmers in order to make voluntary modifications and its distribution. • Such movement lead to the development of MediaWiki software through which Wikipedia website is built.
  • 14. Summary • Cyber Ethics and Netiquettes. • Software Licenses and their categories. • In the next class, we will start Unit III – Cyber Ethics: part 2 in detail. •Thanks