2. INTRODUCTION
Internet is a communication media which is
easily accessible and open to all.
Information Technology is wide spread through
computers, mobile phones and internet.
There is a lot of scope and possibility for issue of
information Technology.
Computer systems in general and
vulnerable.They play an important role in the
daily lives of individuals and business.
3. ETHICS
Ethics means “What is Wrong and What is
Right”. It is a set of moral principles that rule the
behavior of individuals who use computers.
An individual gains knowledge to follow the
right behavior, using morals that are also known
as ethics.
Morals refer to the generally accepted standards
of right and wrong in the society.
4. The core issues in computer ethics are
based on the scenarios arising from the use
of internet such as privacy,publication of
copyrighted content, unauthorized
distribution of digital content and user
interaction with web sites, software and
related services.
5. GUIDELINES OF ETHICS
Generally, the following guidelines should
be observed by computer users:
Honesty: Users should be truthful while
using the internet.
Confidentiality: Users should not share
any important information with
unauthorized people.
6. Respect: Each user should respect the privacy of other
users.
Professionalism: Each user should maintain
professional conduct.
Obey The Law: Users should strictly obey the cyber
law in computer usage.
Responsibility: Each user should take ownership and
responsibility for their actions.
7. COMPUTER ETHICS
With the help of internet, world has now become
a global village.Internet has been proven to be a
boon to individuals as well as various
organizations and businesses.
Computer ethics deals with the procedures,
values and practices that govern the process of
consuming computer technology and its related
disciplines without damaging or violating the
moral values and beliefs of any individual,
organization or entity.
8. CYBER WORLD
Similarly, in cyber world, there are certain standard
such as
Do not use pirated software
Do not use unauthorized user accounts
Do not steal others’ passwords
Do not hack
9. CYBER ETHICS
Cyber law or Internet law is a term that
encapsulates the legal issues related to use of the
Internet.
Cyber ethics is the philosophic study of ethics
pertaining to computers, encompassing user
behavior and what computers are programmed to
do and how this affects individuals and society.
10. DIGITAL ETHICS
Digital ethics is the field of study concerned with
the way technology is shaping and will shape our
political, social and moral existence.
Digital ethics or information ethics in a broader
sense deals with the impact of digital
Information and Communication
Technologies(ICT) on our societies and the
environment at large.
11. COMMANDMENTS OF
COMPUTER ETHICS
The ethical values as defined in 1992 by the
Computer ethics institute;a nonprofit organisation
whose mission is to advance technology by ethical
means, these rules as a guide to computer ethics :
Thou shalt not use a computer to harm other
people.
Thou shalt not interfere with of her people’s
computer work.
12. Thou shalt not snoop around in other
people’s computer files.
Thou shalt not use a computer to steal.
Thou shalt think about the social
consequences of the program you are writing
or the system you designing.
13. INFORMATION TECHNOLOGYACT
In the 21st century , computer , Internet and ICT
or e-revolution has changed the life style of the
people.
In India Cyber law and IT Act 2000, modified in
2008 are being articulated to prevent computer
crimes.
IT Act 2000 is an act to provide legal recognition
for transactions carried out by means of
Electronic Data Interchange (EDI)and other
means of electronic communication.
14. CODE OF ETHICS
(ISC)2 , a professional association which seeks
to inspire a safe and secure cyber world.
Four canons , under a general preamble;
Protect society, the common good, necessary
public trust and confidence and the
infrastracture.
Act honorably, honestly, justly, responsibly and
legally.
15. Provide diligent and competent service to
principles.
Advance and protect the profession.
16. CONCLUSION
To protect the information the following to be
noted;
Complex password setting can make your
surfing secured.
When the internet is not in use, disconnect it.
Do not open spam mail or emails that have an
unfamiliar sender.
When using anti-virus software , keep it up-to-
date.
17. REFERENCES:
Kannan.K., Ramakrishnan V.G , Mohandas(2018).
Computer Ethics and Cyber security.Tamil Nadu
Textbook & Educational Service
http://www.cmpe.boun.edu.tv