Page 11 - modular_v2.0_HTML&_CSS_Fb
P. 11

Cybercrimes

                 A cybercrime can be defined as criminal activities carried out by means of computers or the Internet.
                 With the excessive use of the Internet, the problems of cyber threats, stalking, cyberbulling has
                 emerged. There are various organisations use the Internet to perform their criminal activities
                 online. This way of doing crimes is less expensive and advanced than the traditional way. Few
                 people misuse Internet to exploit others by sharing their pictures or by blackmailing them.

                 Inappropriate Content

                 There are several websites on the Internet that contain inappropriate videos and images, which
                 can negatively impact a child's mental health.

                 Wastage of Time

                 Excessive use of the Internet can lead to wastage of time, as children may become addicted and
                 spend a lot of time surfing the web.

                 Virus and Spam Attacks

                 Internet has also increased the cases of virus attacks. Users can lost their data and programs in
                 these virus attacks.

                 Loss of Personal Information

                 We share our personal information over the Internet that can be misused by cyber criminals to
                 harm you.


                    COMPUTER ETHICS

                 Computer Ethics are the common guidelines that we need to follow while using the computer.
                 These are also known as Etiquettes that tell us how to use the Internet wisely. These guidelines
                 are becoming important because of the rising number of incidents of cybercrime, software piracy,
                 unauthorised access, spamming and hacking.

                 Some of the ethics that one should follow while working on the computer are as follows:
                      One should not use a computer to harm other people.

                      One should not interfere with other's privacy.
                      One should not use  pirated software, as these type of files can harm your device.

                      One should not use a computer to steal data from other’s computer.
                      One should not copy or use proprietary software without permission for which you have
                      not paid.
                      One should not  use other’s  documents, resources without  their  permission  or  without
                      paying them for using those resources.

                      One should not claim other's work as his or her own work.
                      We should think about the social consequences of the program before writing or designing it.



                                                                                                                9
                                                                         Ethics and Safety Measures in Computing
   6   7   8   9   10   11   12   13   14   15   16