Page 11 - Modular_V1.1_Flipbook
P. 11

Cyber Crimes

                 A cyber crime can be defined as criminal activities carried out by means of computers or the
                 Internet. With the excessive use of the Internet, the problems of cyber threats, stalking, cyberbulling

                 has emerged. There are various organisations use the Internet to perform their criminal activities
                 online. This way of doing crimes is less expensive and advanced than the traditional way. Few
                 people misuse Internet to exploit others by sharing their pictures or by blackmailing them.
                 Violent Pictures


                 There are several websites on the Internet that have violent videos and images. This type of
                 content disturbs the mental health of children.
                 Wastage of Time


                 It is a wastage of time as with the excessive use of the Internet people get addicted to it and
                 spend lots of time on surfing.
                 Virus and Spam Attacks


                 Internet has also increased the cases of virus attacks. Users can lost their data and programs in
                 these virus attacks.
                 Loss of Personal Information


                 We share our personal information over the Internet that can be misused by cyber criminals to
                 harm you.

                     COMPUTER ETHICS

                 Computer Ethics are the common guidelines that we need to follow while using the computer.
                 These are also known as Etiquettes that tell us how to use the internet wisely. These are day
                 by day becoming important because of the rising number of incidents of cybercrime, software
                 piracy, unauthorized access, spamming and hacking.

                 Some of the ethics that one should follow while working on the computer are as follows:

                      One should not use a computer to harm other people.
                      One should not interfere with other people’s privacy.

                      One should not look into other‘s documents.
                      One should not use a computer to steal data from other’s computer.

                      One should not copy or use Proprietary Software without the permission for which you have
                      not paid.

                      One should not  use other’s  documents, resources without  their  permission  or  without
                      paying them for using those resources.
                      One should not claim others work as his or her own work .

                      We should think about the social consequences of the program before writing or designing it.


                                                                           Ethics and Safety Measures in Computing  9
   6   7   8   9   10   11   12   13   14   15   16