PP Final
PP Final
It outlines the standards of conduct that are expected of individuals in a particular profession
or industry, and helps to ensure that they behave ethically and responsibly.
A code of ethics helps to promote a culture of integrity, accountability, and social responsibility,
and provides a framework for individuals and organizations to make ethical decisions and take
ethical actions.
What is IEEE?
IEEE stands for the Institute of Electrical and Electronics Engineers, which is the
world's largest technical professional organization dedicated to advancing
technology for the benefit of humanity.
What is IEEE code of ethics?
The IEEE code of ethics is a set of guidelines for engineers and other professionals in the
field of technology. It includes principles such as honesty, integrity, and respect for others.
The code is designed to help ensure that professionals in this field conduct themselves in an
ethical and responsible manner. The code includes specific guidelines for issues such as
confidentiality, conflicts of interest, and environmental responsibility.
• The IEEE code of ethics is an important document that helps to guide the behavior of
professionals in the technology industry. It is designed to promote ethical behavior
and ensure that professionals act in the best interests of the public, their clients, and
their employers. The code includes specific guidelines for issues such as
confidentiality, conflicts of interest, and environmental responsibility.
For example, the code emphasizes the importance of confidentiality in the work of
technology professionals. It requires that professionals respect the confidentiality of
their clients or employers and not disclose any confidential information without proper
authorization.
• The code also emphasizes the importance of avoiding conflicts of interest. It requires that
professionals disclose any potential conflicts of interest and avoid situations where their
personal interests may conflict with the interests of their clients or employers.
• The code is not just a set of guidelines for professionals in the technology industry, but also a
way to promote public trust in the profession. By adhering to the code, technology
professionals can demonstrate their commitment to ethical behavior and the highest standards
of professionalism.
• In addition, the code provides a framework for resolving ethical dilemmas that
may arise in the course of a technology professional's work. By referring to the
code, professionals can identify the ethical principles that apply to a particular
situation and make informed decisions about how to proceed.
• Overall, the IEEE code of ethics is an important tool for promoting ethical
behavior and ensuring that technology professionals act in the best interests of
the public, their clients, and their employers.
ACM CODE OF ETHICS AND PROFESSIONAL
CONDUCT WITH APPROPRIATE SOLUTION
ACM Code of Ethics and Professional Conduct
This principle, which concerns the quality of life of all people, affirms an obligation of
computing professionals, both individually and collectively, to use their skills for the benefit of
society, its members, and the environment surrounding them. This obligation includes promoting
fundamental human rights and protecting each individual's right to autonomy. An essential aim of
computing professionals is to minimize negative consequences of computing, including threats to
health, safety, personal security, and privacy. When the interests of multiple groups conflict, the
needs of those less advantaged should be given increased attention and priority.
1.2 Avoid harm.
The values of equality, tolerance, respect for others, and justice govern this
principle. Fairness requires that even careful decision processes provide some avenue for
redress of grievances.
Computing professionals should foster fair participation of all people, including those of
underrepresented groups. Prejudicial discrimination on the basis of age, color, disability,
ethnicity, family status, gender identity, labor union membership, military status, nationality,
race, religion or belief, or any other inappropriate factor is an explicit violation of the Code.
Harassment, including sexual harassment, bullying, and other abuses of power and authority,
is a form of discrimination that, amongst other harms, limits fair access to the virtual and
physical spaces where such harassment takes place.
1.5 Respect the work required to produce new ideas, inventions, creative works,
and computing artifacts.
Developing new ideas, inventions, creative works, and computing artifacts creates
value for society, and those who expend this effort should expect to gain value from their
work. Computing professionals should therefore credit the creators of ideas, inventions, work,
and artifacts, and respect copyrights, patents, trade secrets, license agreements, and other
methods of protecting authors' works.
"Rules" here include local, regional, national, and international laws and regulations, as
well as any policies and procedures of the organizations to which the professional belongs.
Computing professionals must abide by these rules unless there is a compelling ethical justification
to do otherwise. Rules that are judged unethical should be challenged. A rule may be unethical when
it has an inadequate moral basis or causes recognizable harm. A computing professional should
consider challenging the rule through existing channels before violating the rule. A computing
professional who decides to violate a rule because it is unethical, or for any other reason, must
consider potential consequences and accept responsibility for that action.
2.5 Give comprehensive and thorough evaluations of computer systems and their
impacts, including analysis of possible risks.
As appropriate to the context and one's abilities, computing professionals should share
technical knowledge with the public, foster awareness of computing, and encourage understanding of
computing. These communications with the public should be clear, respectful, and welcoming.
Important issues include the impacts of computer systems, their limitations, their vulnerabilities, and
the opportunities that they present. Additionally, a computing professional should respectfully address
inaccurate or misleading information related to computing.
3. PROFESSIONAL LEADERSHIP PRINCIPLES.
Leadership may either be a formal designation or arise informally from influence over
others. In this section, "leader" means any member of an organization or group who has influence,
educational responsibilities, or managerial responsibilities. While these principles apply to all
computing professionals, leaders bear a heightened responsibility to uphold and promote them,
both within and through their organizations.
A computing professional, especially one acting as a leader, should...
3.1 Ensure that the public good is the central concern during all professional
computing work.
People—including users, customers, colleagues, and others affected directly or indirectly
—should always be the central concern in computing. The public good should always be an
explicit consideration when evaluating tasks associated with research, requirements analysis,
design, implementation, testing, validation, deployment, maintenance, retirement, and disposal.
Computing professionals should keep this focus no matter which methodologies or techniques
they use in their practice.
3.2 Articulate, encourage acceptance of, and evaluate fulfillment of social
responsibilities by members of the organization or group.
Technical organizations and groups affect broader society, and their leaders should
accept the associated responsibilities. Organizations—through procedures and attitudes oriented
toward quality, transparency, and the welfare of society—reduce harm to the public and raise
awareness of the influence of technology in our lives. Therefore, leaders should encourage full
participation of computing professionals in meeting relevant social responsibilities and discourage
tendencies to do otherwise.
3.3 Manage personnel and resources to enhance the quality of working life .
Leaders should ensure that they enhance, not degrade, the quality of working life. Leaders
should consider the personal and professional development, accessibility requirements, physical
safety, psychological well-being, and human dignity of all workers. Appropriate human-computer
ergonomic standards should be used in the workplace.
4. COMPLIANCE WITH THE CODE.
A computing professional should...
4.1 Uphold, promote, and respect the principles of the Code.
The future of computing depends on both technical and ethical excellence. Computing
professionals should adhere to the principles of the Code and contribute to improving them.
Computing professionals who recognize breaches of the Code should take actions to resolve the
ethical issues they recognize, including, when reasonable, expressing their concern to the person or
persons thought to be violating the Code.
4.2 Treat violations of the Code as inconsistent with membership in the ACM.
Each ACM member should encourage and support adherence by all computing
professionals regardless of ACM membership. ACM members who recognize a breach of the Code
should consider reporting the violation to the ACM, which may result in remedial action as specified
in the ACM's Code of Ethics and Professional Conduct Enforcement Policy.
Appropriate Solution (Scenario):
Scenario: You are a software engineer working for a company that develops an AI-driven
algorithm used to screen job applicants. You discover that the algorithm is biased against certain
racial and gender groups, leading to unfair rejections. Your team is under pressure to release the
product quickly.
Solution:
1. Recognize the ethical concern: As a computing professional, you need to acknowledge the
ethical implications of the biased algorithm and the potential harm it can cause to individuals
and society.
2. Raise the issue internally: Bring the issue to the attention of your team and superiors,
emphasizing the ethical concerns, the potential harm, and the violation of the ACM Code of
Ethics. Suggest that the biased algorithm needs to be addressed before releasing the product.
3.Propose a solution: Offer a solution that involves thoroughly reviewing and revising the algorithm
to eliminate bias and ensure fair treatment of all applicants. This may require collecting more diverse
training data, reevaluating the algorithm's design, and implementing safeguards against bias.
4.Advocate for transparency: Emphasize the importance of transparency in the development
process. Encourage documenting the steps taken to address bias, conducting rigorous testing, and
involving independent reviewers to ensure fairness.
5.Seek external guidance if necessary: If the company does not take appropriate action or
disregards the ethical concerns, consider seeking external guidance from professional organizations
or authorities to address the issue responsibly and protect individuals from discrimination.
Remember, the appropriate solution should prioritize the well-being of individuals, adhere to
the ACM Code of Ethics, and promote fairness and transparency in computing practices.
EMPLOYEE
RELATIONS LAW
AND CHANGING
MANAGEMENT
SERVICES
Content of Day
Pay
Work-bargain
E-R Management
Mutual concerns Balance of power Management And The HR Function
Employee representatives
The balance of power, especially in the private
Employee representatives are involved in sector, has shifted to management, who now
discussing issues of mutual concern with have more choice over how they conduct
management, and attending works councils and relationships with their employees
joint consultative committees . .
Institutional Factors
Organizational
climate and
HR policies culture and value Adaptability to
and
systems change
practices
Collective
Codes of conduct bargaining
agreements
Employers’
Labor unions organizations/
federations
Economic Factors
Work Type of
methods technology
Ability of
Rate of organizations and
technology people to cope
change with change
Psychological
Factors
“
Perception
Owners’ attitude
Global Factors
International Relations
Newer formats of Business
Employee Relations
Employee Rights
Employment law covers all rights and obligations
within the employer-employee relationship,
including not only current employees but also
former employees and job applicants.
Discrimin
a t i on
Wrongful termination
Work-Safety
02
03
04
Some Employment Laws of Islamic Republic of
Pakistan
Article 17 provides for a fundamental right to exercise the
freedom of association and the right to form unions
Article 18 proscribes the right of its citizens to enter upon
any lawful profession or occupation and to conduct any lawful
trade or business
Article 25 lays down the right to equality before the law and
prohibition of discrimination on the grounds of sex alone
Article 37(e) makes provision for securing just and
humane conditions of work, ensuring that children and women
are not employed in vocations unsuited to their age, and for
maternity benefits for women in employment
Changing Management Service
The landscape of management service is changing rapidly, driven by new technologies and global
markets. Companies today face a range of challenges, from managing remote teams to staying ahead
of the competition in an increasingly crowded marketplace.To succeed in this new environment,
managers must be adaptable and flexible, able to navigate complex legal and regulatory frameworks
while also keeping up with the latest trends and technologies. They must be skilled communicators,
able to build strong relationships with employees and stakeholders, and they must be able to lead by
example, setting the tone for the rest of the organization.
Managing Employee Relations in a
Changing World
Effective management is more important than
ever in today's rapidly changing business
environment. By building strong relationships
with employees and stakeholders, managers can
create a culture of trust andcollaboration that
drives business success.To do this, managers
must be proactive in their approach to
employee relations, taking steps to prevent
disputes and conflicts from arising and
addressing them quickly and effectively when
they do. They must also be able to adapt to
changing circumstances, using new technologies
and strategies to stay ahead of the curve and
keep their teams engaged and motivated.
conclusion
employee relations law and changing management service are two
critical areas that companies must understand in order to succeed in
today's business environment. By understanding the legal framework
that governs their relationships with employees and adapting to the
changing landscape of management service, companies can build
strong, collaborative cultures that drive innovation and growth.We
hope that this presentation has provided you with valuable insights into
these topics, and that you will be inspired to take action to improve
your own organization's approach to employee relations and
management service. Thank you for joining us today!
Types of web developers. Major
issues in website? How to
resolve them?
PROFESSOR: Sir HASSAN BUTT
TYPES
OF
WEB DEVELOPERS
• Some of everything
MAJOR ISSUES IN WEBSITE & HOW TO
RESOLVE THEM:
• Messy Code.
• Poor or Outdated website design.
• Problematic landing pages.
• Mobile In compatibility.
• Not periodically backed up.
MOBILE INCOMPATIBILITY
&
SOLUTION SOLUTION
• The most effective way to ensure mobile optimization is to use a
responsive website design. Responsive design ensures that your
site will display properly no matter how big or small the screen is.
NOT PERIODICALLY BACKEDUP
SOLUTION
• It’s why you should back up your website periodically.
• if your site is hacked and destroyed, you can retrieve a recent
version of your site. It may be missing some newer content, but at
least your website won’t be down and out. If you regularly update
your site, then you should back it up on a weekly basis .
MESSY CODE
A lot of coding is involved in the building of a website,
especially as you add more functions and features to your site.
. If your functions and features to your site. If your code is
unorganized and messy, it can result in a variety of issues.
PROBLEM
&
SOLUTION
PROBLEM SOLUTION
• Incorrect Robot.txt Files • Use correct Robot txt Files. must
• Extreme Use Of Subfolders in be in lower case, Syntax is
URL Strings “robots.txt”
• No HTTPS Found • Use less slashes in URL , make
sure design short URL.
• Use protocol HTTPS instead of
HTTP , because HTTPS is more
secure.
POOR OR OUTDATED WEBSITE
DESIGN
• The overall design of a website needs to be both functional
and aesthetically pleasing. Visitors will judge how your
website looks, after all. However, website design trends
change relatively often.
PROBLEM
&
SOLUTION PROBLEM
1. Images That Lack Quality.
2. Using A Marketplace Theme.
3. Improper use of Subdomain & Sub-folder.
SOLUTION
1. Low resolution image is not acceptable. Use high resolution
image.
2. Avoid using pre-designed templates for your e-commerce
page. Its changes look completely.
3. Use Sub-folder instead of Sub-domain , because it provide
more option.
• Sub-folder . www.domain.com/blog.
• Sub-domain .blog.domain.com.
PROBLEMATIC LANDING PAGES
• Landing pages are vital to your ability to convert leads. They
help reiterate the benefits of your offer, keep leads focused,
and guide leads to conversion. If your landing pages are poor,
odds are your conversion rate will be too.
PROBLEM
&
SOLUTION PROBLEM
If your landing pages are poor, odds are your conversion rate will be too.
The following are some of the biggest mistakes you can make when
setting up your landing pages:
SOLUTION
1. MakePage.
1. Landing
A Catch-All sure you create a unique and
2. relevant landing page for every
Missing Calls-To-Action.
3. CTA(Catch
Not Setting Thank You Pages.all landing page).
2. Include a CTA that clearly outlines
what action you want your leads to
take on each specific landing page
you create.
3. When you convert a lead through a
landing page, be sure to thank them.
A thank you page will help your leads
feel appreciated.
Topic:
Types of Software and Applications.
Course: Professional Practices.
Teacher:Hassaan Butt
What is software?
Basically, the software is a form of an extension of a command to a system. You can
encode particular software to act a certain way in a system. Without software in a
system, it would be impossible to run anything on it. Software majorly comes in
many types.
Some Types of Software :
• System Software
• Open Source Software
• Programming Software
• Driver Software
System Software:
System software is essentially software that has come within a system and performs
as a part of it. These are pre-installed in the design, and it is not very easy to remove
them from the system. Software like a debugger or the command prompt is all coded
inside a system. Many of your daily functions on a system are performed by such
system software.
Some Common Examples:
• Operating Systems
• Device Drivers
• Programming Language Translators
Open Source Software:
Open-source software (OSS) is any computer software that's distributed with its
source code available for modification. That means it usually includes a license for
programmers to change the software in any way they choose: They can fix bugs,
improve functions, or adapt the software to suit their own needs.
Some Common Examples:
• Linux
• Mozilla Firefox
• VLC Media Player
Programming Software:
Programming software is the type of software that is not used by end-users. It is not for
you unless, you are a programmer who writes code. Programming software are
programs that are used to write, develop, test, and debug other software, including apps
and system software. Programming software is used by software programmers as
translator programs. They are facilitator software used to translate programming
languages into machine language code. Translators can be compilers, interpreters and
assemblers. You can understand compilers as programs that translate the whole source
code into machine code and execute it.
Some Common Examples:
Programming software examples include the different
programming language editors, debuggers, compilers and IDEs.
Such as:
• Eclipse – a Java language editor
• Coda – programming language editor for Mac
• Notepad++ – an open-source editor for windows
Driver Software:
Driver software can operate and control devices and peripherals plugged into a
computer. Drivers are important because they enable the devices to perform their
designated tasks. Therefore, each device connected with your computer requires at
least one device driver to function.
Some Common Examples:
• Printer Driver
• Mouse Driver
• Network Card
What is Application?
Application is a software that helps the user in completing tasks such as doing online
research, setting an alarm, designing graphics or even playing games. They are used
by the user and are specific in their functionality or tasks and do the job that they are
designed to do. For example, a browser is an application software designed
specifically for browsing the internet or MS Powerpoint is an application used
specifically for making presentations. Application Software or simply apps can also
be referred to as non-essential software as their requirement is highly subjective and
their absence does not affect the functioning of the system.
Some Common Examples:
• MS Word
• Adobe Photoshop
• Google Chrome
Types of Application:
Some Types:
• Multimedia software
• Graphics software
• Web browsers
• Presentation software
Multimedia software:
A multimedia software is software that is capable of playing or
recording audio files or playing or recording video files.
Multimedia comes in many different formats. It can be almost
anything you can hear or see. Examples: Images, music, sound,
videos, records, films, animations, and more. Web pages often
contain multimedia elements of different types and formats.
Multimedia elements (like audio or video) are stored in media files.
If a user want to play or use some type of files, he must need to
install multimedia application software first to make playable.
Some Common Examples:
• Windows Media Player
• GOM Player
• VLC Media Player
Graphics software:
Graphics software, is capable of editing graphics in a multitude of
ways and includes a number of types of software, including paint
programs, illustration and design programs, photo/image editors,
presentation graphics software, animation software, computer
aided design software, and some desktop publishing software.
Graphics software can edit bitmap and vector graphics, and can be
used to design label templates.
Some Common Examples:
• Adobe Photoshop
• Adobe Illustrator
• MS Paint
• Corel Draw
Web Browsers:
A web browser, or simply 'browser,' is an application used to
access and view websites available on internet to gain
information around the globe. A web browser is a computer
software application that enables a person to locate, retrieve,
and display content such as webpages, images, video, as well
as other files on the World Wide Web.
Some Common Examples:
• Google Chrome
• Apple Safari
• Mozilla Firefox
• Microsoft Edge
Presentation Software :
Presentation software is defined as computer programs
designed to allow the user to present information in an
engaging way such as with text, pictures, sound and video.
(OR)
A computer software package used to display information,
normally in the form of a slide show.
Some Common Examples:
• Google Slides
• Slidebean
• Keynote for Mac
• MS PowerPoint
So the Question is…
How to Build a Good
Software or
Application???
So here are some characteristics for building a good
software.
• Correctness
Correctness is important for good software. There shouldn’t
be faults with specification, design or
implementation.
• Usability
Users should be able to learn and use a system easily.
• Efficiency
The less resource a piece of software uses, the better. Processor,
memory and disk space usage should be minimized.
• Reliability
A system that can perform the required functions stably is
So here are some characteristics for building a good
software.
• Adaptability
A system that can be used without modification for different
situations it’s good.
• Accuracy
The accuracy of its outputs is good. This measures if the
software outputs the right results for users.
• Robustness
If a system is still working after getting invalid inputs and stressful
environmental conditions, then it’s good for our system..
• Maintainability
The ease in which an existing system can be changed is
So here are some characteristics for building a good
software.
• Portability
A system that operates in different environments from
which it’s originally designed makes it good.
• Speed
A speedy software shows focus to complete tasks as
demanded.
• Readability
Easy to read code is easy to change code. If we understand them
faster, then we can make changes faster and in a less error way.
• Testability
Making our software system testable is critical. If our code
is easy to write unit tests for, then that’s good.
Information system
Information system
. Computer hardware
. Computer software
. Telecommunication
. Databases
. Human resources and procedures
Types of information system
A system that collect that collect stores modifies and retrieves the data
transaction of an enterprise.
Shopping
Management information system
Data capture
Processing of data
Storage of information
Retrieval of information
Dissemination of information
Decision support system
Budget plaining
Stock market
Medical diagnosis
Example of DSS
Project Management
Example of Office automation system
Microsoft office
Envoy
Dialpad
Knowledge Management system
Knowledge management system is both gathering organizing and share
information across an organization.
Share information
ideas
experience
COPYRIGHT
CONTENTS
• What is Copyright?
• History of Copyright.
• Types of Copyright.
• If There is no Copyright.
• Copyright lasts?
• Copyright Regulations
in Europe.
What is Copyright?
• A copyright is a type of intellectual property that gives its owner the
exclusive right to copy and distribute a creative work, usually for a
limited time. The creative work may be in a literary, artistic,
educational, or musical form.
What can be protected?
Literary Works
Musical Works
Dramatic Works
Choreographic Works
Pictorial and Graphic Works
Motion Pictures and AV
Sound Recordings
Architectural Works
…History…
• A Brief History of Copyright. The world's first copyright law was the
Statute of Anne, enacted in England in 1710. This Act introduced for
the first time the concept of the author of a work being the owner of
its copyright, and laid out fixed terms of protection.
Copyright Law
• The Copyright Law of the United States grants monopoly protection
for "original works of authorship". With the stated purpose to
promote art and culture, copyright law assigns a set of exclusive rights
to authors: to make and sell copies of their works, to create derivative
works, and to perform or display their works publicly.
Types of copyright
• Public Performing Right:
The exclusive right of the copyright
owner, granted by the U.S. Copyright Law, to authorize the
performance or transmission of the work in public.
• Mechanical License:
Harry Fox Agency, Inc. issues licenses on behalf of the
copyright owner or his agent, usually to a record company, granting
the record company the right to reproduce.
TYPES OF COPYRIGHT…
• Synchronization License:
Music Publishers issue licenses as copyright
owner or his agent, usually to a producer, granting the right to
synchronize the musical composition in timed relation with audio-
visual images
If There is no Copyright
• The main motive for creative endeavors (money) disappears. If
authors can’t make a living writing, most will not write. If a record
company can’t profit from a band, they will sign fewer band and cut
loose the money losers.
• If copyright exists but can’t be enforced, the above still happens
eventually. The end result is less creative content and hard to pirate
distribution methods become preferred like print and closed
database.
How long does copyright last?
• A copyright last for life plus 70 years for individuals for anything on or
after 1978.
• A copyright lasts for 95 years for corporate authors after publication
for anything on or after 1978. (It is 120 years after creation if not
published.)
• Works published before 1978 and after 1923 are protected for 95
years.
COPYRIGHT REGULATIONS IN
EUROPE:
TOPIC: INNOVATION AND DIGITAL TRANSFORMATION
AND EXPLAIN ITS
COMPONENT WITH
EXAMPLES.......................................
Innovation is the practical
implementation of ideas that result
in the introduction of new goods or
services or improvement in offering
goods or services. innovation as "a
new or changed entity realizing or
redistributing value Turning an idea
into a solution thats add value from
a customer perspective
DIGITAL TRANSFORMATION
WHAT IS DIGITAL
TRANSFORMATION .....................
Digital transformation (DX) is the adoption of digital technology by a company. Common
goals for its implementation are to improve efficiency, value or innovation.
EXAMPLE
Bringing artificial intelligence into your service organization is a prime example of the
power of digital transformation. AI-powered chatbots that answer simple customer
inquiries serve as a welcoming presence on your website, reducing the time customers
have to wait to reach an agent.
HISTORY OF DIGITAL TRANSFORMATION
DIGITILIZATION
is the process of converting analog information into digital form using an analog-to-digital converter,
such as in an image scanner or for digital audio recordings. As usage of the internet has increased since
the 1990s, the usage of digitization has also increased. Digital transformation, however, is broader than
just the digitization of existing processes. Digital transformation entails considering how products,
processes and organizations can be changed through the use of new, digital technologies. Digital
transformation can be seen as a socio-technical programme Between 2015 and 2021, the number of
academic publications dealing with said digital transformation has approximately doubled yearly, from
during 2015 to 2021.Adopting digital technology can bring benefits to a business,[8][9] however some
company cultures can struggle with the changes required by digital transformation.
IN COVID-19:
in 2021 survey, 55% of European companies stated the COVID-19 pandemic has increased the
demand for digitalization, and 46% of companies reported that they have grown more digital.
[16] Half of these companies anticipate an increase in the usage of digital technologies in the
future, with a greater proportion being companies that have previously used digital technology.
[17][18 ] A lack of digital infrastructure was viewed as a key barrier to investment by 16% of EU
businesses, compared to 5% in the US.[13] In a survey conducted in 2021, 89% of African banks
polled claimed that the COVID-19 pandemic has hastened the digital transformation of their
internal operations.[19]
There are seven key components of an effective digital transformation strategy
Professional Practices.
Topic:
Difference between cyber ethics and cyber technology
and the phases of Cyber ethics.
Submitted to:
Sir Hassan Mehboob Butt
What is Cyber Ethics ?
• Cybernetics' is the study of moral, legal, and social issues involving cybertechnology.
• It examines the impact that cybertechnology has for our social, legal, and moral systems.
• It also evaluates the social policies and laws that we frame in response to issues generated by the
1. Privacy:
• The content that is available on the internet should not hurt any moral, emotional, or personal ethics of
individuals.
• Users should have the right to protect any information which they don’t want to share openly.
• Private information like user’s contact details, address, security-related information like bank details,
credit card/debit card details, are all included in basic cyber ethics of user privacy and must not be
2. IPR:
• IPR defines that the owners have the complete right to the content that is posted on the
internet.
• The entire content is solely a belonging of the originator and no individual is allowed to
ethically incorrect to not give creation and monetary benefits to the creator of the work.
Cyber Ethics Purposes
3. Security:
• Security on the internet is the most basic ethical right that every user must be accessible.
• Users of the internet should feel safe while they surf the net.
• Security, in general means only authorized users to have access to the content on the computer.
4. Accuracy:
• If there is no reliability of the information that is posted online, then it would mislead the masses.
• Cyber ethics assert the importance of posting content on the internet that is correct in all aspects.
• Users trust the content of the internet and rely heavily on the internet for facts, therefore it is highly needed that
Cyber ethics is a more accurate label than computer ethics, which can suggest the study of ethical issues
• computing machines.
• computing professionals.
Phase 1
(1950s and 1960s), One ethical/social question that arose during Phase 1 dealt with the impact of
computing machines as “giant brains” and what that meant for being human. Today, we might associate
these kinds of questions with the field of artificial intelligence (or AI). The following kinds of questions
If machines can be intelligent entities, what does this mean for our sense of self?
Phase 2
(1970s and 1980s), computing machines and communications devices began to converge.
Mainframe computers and personal computers could be linked together via privately owned networks,
1) privacy concerns (introduced in Phase 1) were exacerbated because confidential information could
2) intellectual property issues emerged because personal computers could easily be used to duplicate and
3) computer crime emerged because “hackers” could break into the computers of large organizations.
Phases Of Cyber Ethics
Phase 3
(1990-present), the availability of Internet access to the general public has increased significantly.
This has been facilitated by the phenomenal growth of the World Wide Web.
The proliferation of Internet- and Web-based technologies in this phase has raised ethical and social
concerns affecting:
• Free speech.
• Anonymity.
• Jurisdiction.
• Trust.
Phases Of Cyber Ethics
Phase 4
(present to near future), “Web 2.0” has made possible the proliferation of social networking sites (SNSs),
Additional ethical/social concerns associated with Phase IV include controversies that are made possible
autonomous machines and sophisticated robots (used in warfare, transportation, care for the elderly,
etc.);
artificial agents (including “soft bots”) that act on behalf of humans and corporations;
AI-induced bionic chip implants (that can cause us to question what it means to be human vs. cyborg).
Summary Of Four Phases Of Cyber Ethics
Phase Time Period Technological Features Associated Issues
3 1990s-Present Internet and World Wide Web Issues from Phases 1 and 2
plus concerns about free
speech, anonymity, legal
jurisdiction, virtual
communities, etc.
4 Present to Convergence of information and communication Issues from Phases 1-3 plus
Near Future technologies with nanotechnology research and concerns about artificial
bioinformatics research, etc. agents ("bots") with
decision-making
capabilities, AI-induced
bionic chip implants, nano
computing, pervasive
computing, etc.
What is Internet Fraud?
Internet fraud involves using online services and software with access
to the internet to defraud or take advantage of victims. The term
"internet fraud" generally covers cybercrime activity that takes place
over the internet or on email, including crimes like identity theft,
phishing, and other hacking activities designed to scam people out of
money.
Types of Internet Fraud
Investment Fraud
The popularity of the internet can be attributed to its ubiquitous nature and also being the budget-friendly
medium. To top it all off, the convenience the web provides is what makes it more desirable. No doubt, investors
were attracted to look for investments online. As soon as investors moved to the internet, fraudsters were quick to
follow. They left no stone unturned to get the investors hooked. From tall and false promises about potential
returns to added benefits for bringing in more clients, they tried all.
These fraudsters either run away with the money or keep adding new conditions for the returns.
Malware
Another prevalent form of online fraud is the malware attack. The word malware is short for
malicious software, which are basically files/programs that are potentially harmful to a computer
or a site. These attacks are quite brutal ones and, in most cases, they could lead to serious loss of
business and reputation for the webmasters.
Malware could be injected either by exploiting a vulnerability on a website or by bypassing its
security by shrewd methods. Some of the common ways a hacker injects malware are with SQLi,
JavaScript injection, malicious code injection, etc.
Clearly, the internet is intertwined in our day-to-day lives. To be honest, we cannot do without it,
so shutting it off completely is not an option. Instead, we need to be more clever than the
scammers. Be aware of their tactics and strive to have a more secure cyberspace.