0% found this document useful (0 votes)
241 views

ICT Ethics and Security

This document discusses ethics and security related to information and communication technology (ICT). It defines ICT ethics as dealing with procedures, values and practices for using ICT without damaging moral values or beliefs. The objectives of ICT ethics are to ensure privacy and safety of computer users and proper use of computers. Digital plagiarism, copyright violations, and improper computer use such as hacking or viewing files without permission are also discussed, along with steps to maintain privacy and security online. Ethical rules for computer users focus on issues like intellectual property rights and how technology impacts society.

Uploaded by

Syed Ali Haider
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
241 views

ICT Ethics and Security

This document discusses ethics and security related to information and communication technology (ICT). It defines ICT ethics as dealing with procedures, values and practices for using ICT without damaging moral values or beliefs. The objectives of ICT ethics are to ensure privacy and safety of computer users and proper use of computers. Digital plagiarism, copyright violations, and improper computer use such as hacking or viewing files without permission are also discussed, along with steps to maintain privacy and security online. Ethical rules for computer users focus on issues like intellectual property rights and how technology impacts society.

Uploaded by

Syed Ali Haider
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Ch#5 ICT ETHICS AND SECURITY Class#6th

Q: Define Ethics and safety on ICT?


Ans: Ethics means a set of moral principles that govern the behavior of an
individual or group.
ICT Ethics deals with the procedures, values and practices that govern the process
of using ICT and its related disciplines without damaging or violating the moral
values and beliefs of any individual, organization or entity.
The objectives of ICT ethics are to ensure the privacy and safety of the computer
users and help the people to use the computer in the right way.
Cheating describes the act of taking an unfair or forbidden advantage. For example
 Fake accounts
 Providing wrong or misleading information
 Using someone else work and present it as your own
 Using someone else user-id and password
 Sharing someone’s personal information on social media
Q: Define Digital Plagiarism?
Ans: Plagiarism is the act of copying and presenting someone else’s work like text
(essay, paragraph etc), media (picture, music, videos etc) and even ideas or
software as your own . These days most information is available in digital format
as online resources that makes it easy to copy and paste the information as
someone’s own, therefore plagiarism today has become a serious problem.
Fortunately, to counter the plagiarism problem there are laws in place to protect
against plagiarism. The most notable is International copyright law, which states
that each individuals published work is automatically protected by copyright. This
means no one can copy the work of an author/ writer without the author’s approval
or consent. If somebody breaks or violates the copyright law he / she will be
punished as per law.
Q: Describe consequences of breaking copyright and software theft?
Ans: Copyright laws protect the authors of a literary or artistic work from theft of
the material by someone else. Copyright violation is the unauthorized use of
copyright material or its distribution to the public without the author’s permission.
Violators of copyright may face variety of penalties and or punishment associated
with copyright laws.

TYPED BY: SYED ALI HAIDER SUBJECT: COMPUTER


Ch#5 ICT ETHICS AND SECURITY Class#6th

Q: Identify improper use of computer resources?


Ans: We use computers for work and communicate on social network sites and
sharte links of online entertainment sites with friends and family. The same way
cyber criminals use social network sires and try to hack and track information , like
passwords through infected files.
It is therefore necessary to follow the cyber safety rules for the use of computers at
school, at home, or office.
The improper use of computer resources may harm you, your friends and family
also,
To keep everyone safe and sound you should not:
(1) use someone else’s use ID or password without permission of his/ her
knowledge.
(2) View, copy, transfer, modify or make public, the files, printouts or personal
work of others without permission.
(3) Alter or delete system files
(4) Use licensed software without permission.
(5) Send infected files to the system or to others
Q: Identify steps to secure Privacy, confidentiality, personal information sharing?
Ans: following are the steps to secure Privacy, confidentiality, personal
information sharing:
(1) Never give out your name , address, phone number, e-mail, password or school
name to non-related or strangers.
(2) Never share a picture of yourself with strangers.
(3) Never open e-mail, files, web pages from unknown sources or person.
(4) Always check your teacher/ parent before downloading any information of
application.
(5) Never respond to strangers online.
(6) Tell your teacher / parents if something makes you uncomfortable scred or
confused.

TYPED BY: SYED ALI HAIDER SUBJECT: COMPUTER


Ch#5 ICT ETHICS AND SECURITY Class#6th

(7) Tell your teacher / parents if anyone online asks you to meet in person.
(8) Never share your movement plans or location on social network.
(9) Never enter online chat room without an adult person.
(10) Do not share details about your life with others online.
(11) About using abusive language
(12) Do not buy or order anything online without parent’s supervision.
(13) Do not save personal information on public devices
(14) File sharing is ethical but don’t share virus infected files that can harm any
one’s data or computer
Q: Identify Ethical rules for the computer users?
Ans: Computer ethics is set of moral principles that regulate the use of computers.
Some computer and internet ethics include intellectual property right (such as
copyrighted electronic content), privacy concerns, how computers affect society.
Q: Define cyber Ethics, Cyber Safety, Cyber Security?
Ans: CYBER ETHICS refers to the code of responsible behavior on the internet.
Just as we are taught to act responsibly in everyday life with lessons such as
“Don’t take what does not belong to you” and ”Do not harm others”, We must act
responsibly in cyber world as well. The basic rule is “Do not do something in
cyber space that you would consider wrong or illegal in everyday life”.
Following are some ethical rules for internet and cyber space usage:
(i) one should value and accept the opinions of others, accept international,
national and local and cultural values
(ii) While using e-mail, chatting on social media, use appropriate language during
communication.
(iii) Avoid debates about religious sensitive topics, political affiliation etc.
(iv)Avoid sharing personal information on internet.
(v) Abide by copyright law while downloading any material or software

TYPED BY: SYED ALI HAIDER SUBJECT: COMPUTER


Ch#5 ICT ETHICS AND SECURITY Class#6th

(vi) Use facilities and services only for the purpose for which you are authorized.
In case of breach, the safety of the person may be compromised and one may
become a victim of cyber bullying.
Cyber bullying is harassment like threatening, embarrassing, or targeting another
person with the use of technology. Online threats, aggressiveness, mean, or rude
texts, tweets, posts or messages all count. So does posting personal information,
pictures, or videos designed to hurt or embarrass someone else.
CYBER SAFETY AND SECURITY is the safe and responsible use of information
and communication Technology. It is about being safe, secure and responsible with
the information.
Acceptable user policy is an arrangement between the user and the provider that
defines how users are allowed to use the network or internet. An acceptable user
policy should describe both the acceptable and unacceptable behavior.

TYPED BY: SYED ALI HAIDER SUBJECT: COMPUTER

You might also like