0% found this document useful (0 votes)
47 views

PP Final

The document discusses the IEEE code of ethics, which provides guidelines for engineers and other technology professionals to ensure they conduct themselves ethically. It includes principles like honesty, integrity, and respect for others. The code addresses issues like confidentiality, conflicts of interest, and environmental responsibility. It aims to promote ethical behavior, public trust, and ensure professionals act in the best interests of clients, employers, and the public. The code provides a framework for resolving ethical dilemmas that may arise in professional work.

Uploaded by

Muhammad Subhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views

PP Final

The document discusses the IEEE code of ethics, which provides guidelines for engineers and other technology professionals to ensure they conduct themselves ethically. It includes principles like honesty, integrity, and respect for others. The code addresses issues like confidentiality, conflicts of interest, and environmental responsibility. It aims to promote ethical behavior, public trust, and ensure professionals act in the best interests of clients, employers, and the public. The code provides a framework for resolving ethical dilemmas that may arise in professional work.

Uploaded by

Muhammad Subhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 141

TOPIC :

IEEE CODE OF ETHICS


What is ethics?

Statements of what is right or wrong


What is code of ethics:
A code of ethics is a set of principles and values that guide the behavior and decision-making of
individuals and organizations.

It outlines the standards of conduct that are expected of individuals in a particular profession
or industry, and helps to ensure that they behave ethically and responsibly.

A code of ethics helps to promote a culture of integrity, accountability, and social responsibility,
and provides a framework for individuals and organizations to make ethical decisions and take
ethical actions.
What is IEEE?

IEEE stands for the Institute of Electrical and Electronics Engineers, which is the
world's largest technical professional organization dedicated to advancing
technology for the benefit of humanity.
What is IEEE code of ethics?

The IEEE code of ethics is a set of guidelines for engineers and other professionals in the
field of technology. It includes principles such as honesty, integrity, and respect for others.
The code is designed to help ensure that professionals in this field conduct themselves in an
ethical and responsible manner. The code includes specific guidelines for issues such as
confidentiality, conflicts of interest, and environmental responsibility.
• The IEEE code of ethics is an important document that helps to guide the behavior of
professionals in the technology industry. It is designed to promote ethical behavior
and ensure that professionals act in the best interests of the public, their clients, and
their employers. The code includes specific guidelines for issues such as
confidentiality, conflicts of interest, and environmental responsibility.

For example, the code emphasizes the importance of confidentiality in the work of
technology professionals. It requires that professionals respect the confidentiality of
their clients or employers and not disclose any confidential information without proper
authorization.
• The code also emphasizes the importance of avoiding conflicts of interest. It requires that
professionals disclose any potential conflicts of interest and avoid situations where their
personal interests may conflict with the interests of their clients or employers.

• The code is not just a set of guidelines for professionals in the technology industry, but also a
way to promote public trust in the profession. By adhering to the code, technology
professionals can demonstrate their commitment to ethical behavior and the highest standards
of professionalism.
• In addition, the code provides a framework for resolving ethical dilemmas that
may arise in the course of a technology professional's work. By referring to the
code, professionals can identify the ethical principles that apply to a particular
situation and make informed decisions about how to proceed.

• Overall, the IEEE code of ethics is an important tool for promoting ethical
behavior and ensuring that technology professionals act in the best interests of
the public, their clients, and their employers.
ACM CODE OF ETHICS AND PROFESSIONAL
CONDUCT WITH APPROPRIATE SOLUTION
ACM Code of Ethics and Professional Conduct

Computing professionals' actions change the world. To act responsibly, they


should reflect upon the wider impacts of their work, consistently supporting the public good.
The ACM (Association for Computing Machinery )Code of Ethics and Professional Conduct
("the Code") expresses the conscience of the profession.
The Code is designed to inspire and guide the ethical conduct of all computing professionals,
including current and aspiring practitioners, instructors, students, influencers, and anyone who
uses computing technology in an impactful way. Additionally, the Code serves as a basis for
remediation when violations occur. The Code includes principles formulated as statements of
responsibility, based on the understanding that the public good is always the primary
consideration. Each principle is supplemented by guidelines, which provide explanations to
assist computing professionals in understanding and applying the principle.
1. GENERAL ETHICAL PRINCIPLES.
A computing professional should...

1.1 Contribute to society and to human well-being, acknowledging that all


people are stakeholders in computing.

This principle, which concerns the quality of life of all people, affirms an obligation of
computing professionals, both individually and collectively, to use their skills for the benefit of
society, its members, and the environment surrounding them. This obligation includes promoting
fundamental human rights and protecting each individual's right to autonomy. An essential aim of
computing professionals is to minimize negative consequences of computing, including threats to
health, safety, personal security, and privacy. When the interests of multiple groups conflict, the
needs of those less advantaged should be given increased attention and priority.
1.2 Avoid harm.

In this, "harm" means negative consequences, especially when those consequences


are significant and unjust. Examples of harm include unjustified physical or mental injury,
unjustified destruction or disclosure of information, and unjustified damage to property,
reputation, and the environment. This list is not exhaustive.
Well-intended actions, including those that accomplish assigned duties, may lead to harm.
When that harm is unintended, those responsible are obliged to undo or mitigate the harm as
much as possible. Avoiding harm begins with careful consideration of potential impacts on all
those affected by decisions. When harm is an intentional part of the system, those responsible
are obligated to ensure that the harm is ethically justified. In either case, ensure that all harm
is minimized.
1.3 Be honest and trustworthy.

Honesty is an essential component of trustworthiness. A computing professional should


be transparent and provide full disclosure of all pertinent system capabilities, limitations, and
potential problems to the appropriate parties. Making deliberately false or misleading claims,
fabricating or falsifying data, offering or accepting bribes, and other dishonest conduct are
violations of the Code.
Computing professionals should be honest about their qualifications, and about any limitations in
their competence to complete a task. Computing professionals should be forthright about any
circumstances that might lead to either real or perceived conflicts of interest or otherwise tend to
undermine the independence of their judgment. Furthermore, commitments should be honored.
1.4 Be fair and take action not to discriminate.

The values of equality, tolerance, respect for others, and justice govern this
principle. Fairness requires that even careful decision processes provide some avenue for
redress of grievances.
Computing professionals should foster fair participation of all people, including those of
underrepresented groups. Prejudicial discrimination on the basis of age, color, disability,
ethnicity, family status, gender identity, labor union membership, military status, nationality,
race, religion or belief, or any other inappropriate factor is an explicit violation of the Code.
Harassment, including sexual harassment, bullying, and other abuses of power and authority,
is a form of discrimination that, amongst other harms, limits fair access to the virtual and
physical spaces where such harassment takes place.
1.5 Respect the work required to produce new ideas, inventions, creative works,
and computing artifacts.
Developing new ideas, inventions, creative works, and computing artifacts creates
value for society, and those who expend this effort should expect to gain value from their
work. Computing professionals should therefore credit the creators of ideas, inventions, work,
and artifacts, and respect copyrights, patents, trade secrets, license agreements, and other
methods of protecting authors' works.

1.6 Respect privacy.


The responsibility of respecting privacy applies to computing professionals in a
particularly profound way. Technology enables the collection, monitoring, and exchange of
personal information quickly, inexpensively, and often without the knowledge of the people
affected. Therefore, a computing professional should become conversant in the various
definitions and forms of privacy and should understand the rights and responsibilities
associated with the collection and use of personal information.
1.7 Honor confidentiality.
Computing professionals are often entrusted with confidential information such as
trade secrets, client data, nonpublic business strategies, financial information, research data,
pre-publication scholarly articles, and patent applications. Computing professionals should
protect confidentiality except in cases where it is evidence of the violation of law, of
organizational regulations, or of the Code. In these cases, the nature or contents of that
information should not be disclosed except to appropriate authorities. A computing
professional should consider thoughtfully whether such disclosures are consistent with the
Code.
2. PROFESSIONAL RESPONSIBILITIES.
A computing professional should...
2.1 Strive to achieve high quality in both the processes and products of
professional work.
Computing professionals should insist on and support high quality work from themselves
and from colleagues. The dignity of employers, employees, colleagues, clients, users, and anyone
else affected either directly or indirectly by the work should be respected throughout the process.
Computing professionals should respect the right of those involved to transparent communication
about the project. Professionals should be cognizant of any serious negative consequences
affecting any stakeholder that may result from poor quality work and should resist inducements
to neglect this responsibility.
2.2 Maintain high standards of professional competence, conduct, and ethical practice.
High quality computing depends on individuals and teams who take personal and
group responsibility for acquiring and maintaining professional competence. Professional
competence starts with technical knowledge and with awareness of the social context in which their
work may be deployed. Professional competence also requires skill in communication, in reflective
analysis, and in recognizing and navigating ethical challenges. Upgrading skills should be an
ongoing process and might include independent study, attending conferences or seminars, and other
informal or formal education. Professional organizations and employers should encourage and
facilitate these activities.
2.3 Accept and provide appropriate professional review.
High quality professional work in computing depends on professional review at all stages.
Whenever appropriate, computing professionals should seek and utilize peer and stakeholder review.
Computing professionals should also provide constructive, critical reviews of others' work.
2.4 Know and respect existing rules pertaining to professional work.

"Rules" here include local, regional, national, and international laws and regulations, as
well as any policies and procedures of the organizations to which the professional belongs.
Computing professionals must abide by these rules unless there is a compelling ethical justification
to do otherwise. Rules that are judged unethical should be challenged. A rule may be unethical when
it has an inadequate moral basis or causes recognizable harm. A computing professional should
consider challenging the rule through existing channels before violating the rule. A computing
professional who decides to violate a rule because it is unethical, or for any other reason, must
consider potential consequences and accept responsibility for that action.
2.5 Give comprehensive and thorough evaluations of computer systems and their
impacts, including analysis of possible risks.

Computing professionals are in a position of trust, and therefore have a special


responsibility to provide objective, credible evaluations and testimony to employers, employees,
clients, users, and the public. Computing professionals should strive to be perceptive, thorough,
and objective when evaluating, recommending, and presenting system descriptions and
alternatives. Extraordinary care should be taken to identify and mitigate potential risks in
machine learning systems. A system for which future risks cannot be reliably predicted requires
frequent reassessment of risk as the system evolves in use, or it should not be deployed. Any
issues that might result in major risk must be reported to appropriate parties
2.6 Foster public awareness and understanding of computing, related technologies, and
their consequences.

As appropriate to the context and one's abilities, computing professionals should share
technical knowledge with the public, foster awareness of computing, and encourage understanding of
computing. These communications with the public should be clear, respectful, and welcoming.
Important issues include the impacts of computer systems, their limitations, their vulnerabilities, and
the opportunities that they present. Additionally, a computing professional should respectfully address
inaccurate or misleading information related to computing.
3. PROFESSIONAL LEADERSHIP PRINCIPLES.
Leadership may either be a formal designation or arise informally from influence over
others. In this section, "leader" means any member of an organization or group who has influence,
educational responsibilities, or managerial responsibilities. While these principles apply to all
computing professionals, leaders bear a heightened responsibility to uphold and promote them,
both within and through their organizations.
A computing professional, especially one acting as a leader, should...
3.1 Ensure that the public good is the central concern during all professional
computing work.
People—including users, customers, colleagues, and others affected directly or indirectly
—should always be the central concern in computing. The public good should always be an
explicit consideration when evaluating tasks associated with research, requirements analysis,
design, implementation, testing, validation, deployment, maintenance, retirement, and disposal.
Computing professionals should keep this focus no matter which methodologies or techniques
they use in their practice.
3.2 Articulate, encourage acceptance of, and evaluate fulfillment of social
responsibilities by members of the organization or group.
Technical organizations and groups affect broader society, and their leaders should
accept the associated responsibilities. Organizations—through procedures and attitudes oriented
toward quality, transparency, and the welfare of society—reduce harm to the public and raise
awareness of the influence of technology in our lives. Therefore, leaders should encourage full
participation of computing professionals in meeting relevant social responsibilities and discourage
tendencies to do otherwise.
3.3 Manage personnel and resources to enhance the quality of working life .
Leaders should ensure that they enhance, not degrade, the quality of working life. Leaders
should consider the personal and professional development, accessibility requirements, physical
safety, psychological well-being, and human dignity of all workers. Appropriate human-computer
ergonomic standards should be used in the workplace.
4. COMPLIANCE WITH THE CODE.
A computing professional should...
4.1 Uphold, promote, and respect the principles of the Code.
The future of computing depends on both technical and ethical excellence. Computing
professionals should adhere to the principles of the Code and contribute to improving them.
Computing professionals who recognize breaches of the Code should take actions to resolve the
ethical issues they recognize, including, when reasonable, expressing their concern to the person or
persons thought to be violating the Code.
4.2 Treat violations of the Code as inconsistent with membership in the ACM.
Each ACM member should encourage and support adherence by all computing
professionals regardless of ACM membership. ACM members who recognize a breach of the Code
should consider reporting the violation to the ACM, which may result in remedial action as specified
in the ACM's Code of Ethics and Professional Conduct Enforcement Policy.
Appropriate Solution (Scenario):

Scenario: You are a software engineer working for a company that develops an AI-driven
algorithm used to screen job applicants. You discover that the algorithm is biased against certain
racial and gender groups, leading to unfair rejections. Your team is under pressure to release the
product quickly.

Solution:

1. Recognize the ethical concern: As a computing professional, you need to acknowledge the
ethical implications of the biased algorithm and the potential harm it can cause to individuals
and society.
2. Raise the issue internally: Bring the issue to the attention of your team and superiors,
emphasizing the ethical concerns, the potential harm, and the violation of the ACM Code of
Ethics. Suggest that the biased algorithm needs to be addressed before releasing the product.
3.Propose a solution: Offer a solution that involves thoroughly reviewing and revising the algorithm
to eliminate bias and ensure fair treatment of all applicants. This may require collecting more diverse
training data, reevaluating the algorithm's design, and implementing safeguards against bias.
4.Advocate for transparency: Emphasize the importance of transparency in the development
process. Encourage documenting the steps taken to address bias, conducting rigorous testing, and
involving independent reviewers to ensure fairness.
5.Seek external guidance if necessary: If the company does not take appropriate action or
disregards the ethical concerns, consider seeking external guidance from professional organizations
or authorities to address the issue responsibly and protect individuals from discrimination.
Remember, the appropriate solution should prioritize the well-being of individuals, adhere to
the ACM Code of Ethics, and promote fairness and transparency in computing practices.
EMPLOYEE
RELATIONS LAW
AND CHANGING
MANAGEMENT
SERVICES
Content of Day

01 :INTRODUCTION 03: LAWS

02 :EMP-Relation 04: changing management services


INTRODUCTION
Employee relations consist of all those areas of
human resource management that involve
relationships with employees-directly or through
collective agreements where trade unions are
recognized.
 Employee relations practices include formal
processes, procedures and channels of
communication.
The basis of Employee Relations
Employee Relations involves the body of work concerned with maintaining employer employee
relationships that contribute to satisfactory productivity, motivation, and morale.

Employee relations are basically about:

Pay

Work-bargain

providing employees with a voice and communicating with


employees

Dealing with employment practices


Industrial Relation is that part of management which is
concerned with the manpower of the
enterprise – whether machine operator,
skilled worker or manager.
 BETHEL, SMITH & GROUP Industrial
Relation is a relation between employer
and employees, employees and employees
and employees and trade unions. -
Industrial dispute Act 1947
Types of Relationships within
Organization

 Employer and Employee relationship.


 Employee and Employer relationship.
 Employ relationship among themselves.
The Parties To Employee Relations
Government
The government plays multiple roles in
shaping employee relations. These
Government
include being a major employer in its
Important role
own right that sets standards of good
employee relations practice
Staff Association
Trade Union Staff ASS. Staff associations are sometimes formed to
TRADE UNIONS Interest for Negotiating Right represent employees in the absence of
members unions. They may sometimes have
Traditionally the fundamental purpose
representational or even negotiating right
of trade unions is to promote and protect
the interests of their members..

E-R Management
Mutual concerns Balance of power Management And The HR Function
Employee representatives
The balance of power, especially in the private
Employee representatives are involved in sector, has shifted to management, who now
discussing issues of mutual concern with have more choice over how they conduct
management, and attending works councils and relationships with their employees
joint consultative committees . .
Institutional Factors
Organizational
climate and
HR policies culture and value Adaptability to
and
systems change
practices

Collective
Codes of conduct bargaining
agreements

Employers’
Labor unions organizations/
federations
Economic Factors

 Type of ownership: public or private limited, Whether domestic,


Govt. or private sector
 Nature and composition of the workforce
 The source of labor
 Labour market status
 Disparity(gap) of wages between groups Level of unemployment
Technological Factors

Work Type of
methods technology

Ability of
Rate of organizations and
technology people to cope
change with change
Psychological
Factors

Workers’ attitude towards work


Perception
Owners’ attitude

Their motivation, interest, dissatisfaction and boredom


leading from man-machine interface.
Political and Legal Factors
• Prevalent(dominant)
• Political philosophy
• Attitude of government
• The ruling partyideology
• Labor laws Changes in the above framework
• Role of political factions(parties)

Global Factors
 International Relations
 Newer formats of Business

Employee Relations
Employee Rights
Employment law covers all rights and obligations
within the employer-employee relationship,
including not only current employees but also
former employees and job applicants.
Discrimin
a t i on
Wrongful termination

Work-Safety

Employee relations Laws


UN Deployed: Employee Rights in the
Workplace
Privacy In Workplace
personal possessions, including handbags or briefcases, storage
lockers accessible only by the employee
Discrimination
Right to be free from discrimination
and harassment of all types
Safe-Workplace
Right to a safe workplace free of dangerous conditions, toxic
substances, and other potential safety hazards
Fair wages

01 Right to fair wages for work performed

02
03
04
Some Employment Laws of Islamic Republic of
Pakistan
Article 17 provides for a fundamental right to exercise the
freedom of association and the right to form unions
Article 18 proscribes the right of its citizens to enter upon
any lawful profession or occupation and to conduct any lawful
trade or business
Article 25 lays down the right to equality before the law and
prohibition of discrimination on the grounds of sex alone
Article 37(e) makes provision for securing just and
humane conditions of work, ensuring that children and women
are not employed in vocations unsuited to their age, and for
maternity benefits for women in employment
Changing Management Service
The landscape of management service is changing rapidly, driven by new technologies and global
markets. Companies today face a range of challenges, from managing remote teams to staying ahead
of the competition in an increasingly crowded marketplace.To succeed in this new environment,
managers must be adaptable and flexible, able to navigate complex legal and regulatory frameworks
while also keeping up with the latest trends and technologies. They must be skilled communicators,
able to build strong relationships with employees and stakeholders, and they must be able to lead by
example, setting the tone for the rest of the organization.
Managing Employee Relations in a
Changing World
Effective management is more important than
ever in today's rapidly changing business
environment. By building strong relationships
with employees and stakeholders, managers can
create a culture of trust andcollaboration that
drives business success.To do this, managers
must be proactive in their approach to
employee relations, taking steps to prevent
disputes and conflicts from arising and
addressing them quickly and effectively when
they do. They must also be able to adapt to
changing circumstances, using new technologies
and strategies to stay ahead of the curve and
keep their teams engaged and motivated.
conclusion
employee relations law and changing management service are two
critical areas that companies must understand in order to succeed in
today's business environment. By understanding the legal framework
that governs their relationships with employees and adapting to the
changing landscape of management service, companies can build
strong, collaborative cultures that drive innovation and growth.We
hope that this presentation has provided you with valuable insights into
these topics, and that you will be inspired to take action to improve
your own organization's approach to employee relations and
management service. Thank you for joining us today!
Types of web developers. Major
issues in website? How to
resolve them?
PROFESSOR: Sir HASSAN BUTT
TYPES
OF
WEB DEVELOPERS

There are Three Types of Web developers.


• The Front-End Developers
• The Back-End Developers
• The Full-Stack Developers
THE FRONT-END DEVELOPERS:
The front-end developer is responsible for creating the look, feel
and interactive components of a website. They are often mistaken
as the only role in web development as well as confused with the
role of a web designer. How text, images, and colors are displayed
on a website when you view them on a phone, tablet, or
computer is what the font-end developer creates. Ever see a
button change color when you hover over it or a popup appear
when you click on something on a page? That’s what the front-
end developer creates. The make sure everything you see is
organized, aesthetically pleasing, and functional.
TYPICAL PROGRAMMING LANGUAGES A FRONT-
END DEVELOPER WRITES

Some are Describe below:


1. HTML
2. CSS
3. JavaScript
4. J Query
THE BACK-END DEVELOPER
The back-end developer has one of the most crucial roles in web
development. They create and maintain what’s under the hood to
keep your website running and functioning properly. A back-end
developer writes what is called server-side code to make sure data
flows back and forth from a website’s front-end(what the user sees
and interacts with) to the server, the database etc.). The best
example of this would be an online store. Prices and product images
are stored on a database hosted on a server. When it comes time to
update prices or initiate an automated holiday sale, Product
information and prices are updates on the database which then
displays on the website.
TYPICAL PROGRAMMING LANGUAGES A BACK-
END DEVELOPER WRITES

Some are Describe below:


1. Java
2. PHP
3. C#
4. MySQL
THE FULL-STACK DEVELOPER
The full-stack developer is a unique developer type as they
can program and work on both front-end and back-end parts
of a website. They can literally create an entire functioning,
dynamic website themselves(if they choose) as they
understand both ends of web development. Full-stack
developers tend to have prowess in coding in multiple
programming languages and their knowledge and experience
tend to be a mile-wide. Because of this, they generally work
well with both the front-end and back-end developers during
the development process.
TYPICAL PROGRAMMING LANGUAGES A FULL-
STACK DEVELOPER WRITES

• Some of everything
MAJOR ISSUES IN WEBSITE & HOW TO
RESOLVE THEM:
• Messy Code.
• Poor or Outdated website design.
• Problematic landing pages.
• Mobile In compatibility.
• Not periodically backed up.
MOBILE INCOMPATIBILITY

• Around 20 percent of American adults only use their


smartphones to access the internet. Additionally, 52.2
percent of the World’s web traffic is generated through
mobile phones. This means that significant amount of your
website traffic will be coming via mobile devices both now
and in the future.
PROBLEM
• If your website isn’t mobile-friendly, it will affect how it’s displayed
on mobile devices. If your site doesn’t display properly, load quickly
(or at all), or is difficult to navigate on mobile devices, you’ll lose a
massive number of potential leads. To top it off, Google ranks pages
for mobile separately from desktop, meaning that a lack of mobile
PROBLEM optimization can hurt your ability to bring in web traffic.

&
SOLUTION SOLUTION
• The most effective way to ensure mobile optimization is to use a
responsive website design. Responsive design ensures that your
site will display properly no matter how big or small the screen is.
NOT PERIODICALLY BACKEDUP

• Even if you take security of your website seriously and take


every precaution to protect your site against hackers, you
should always plan for the worse.
PROBLEM
&
SOLUTION PROBLEM
• If a hacker is able to penetrate your security, they could potentially
destroy your entire website. As you can imagine, this could be
incredibly problematic .

SOLUTION
• It’s why you should back up your website periodically.
• if your site is hacked and destroyed, you can retrieve a recent
version of your site. It may be missing some newer content, but at
least your website won’t be down and out. If you regularly update
your site, then you should back it up on a weekly basis .
MESSY CODE
A lot of coding is involved in the building of a website,
especially as you add more functions and features to your site.
. If your functions and features to your site. If your code is
unorganized and messy, it can result in a variety of issues.
PROBLEM
&
SOLUTION
PROBLEM SOLUTION
• Incorrect Robot.txt Files • Use correct Robot txt Files. must
• Extreme Use Of Subfolders in be in lower case, Syntax is
URL Strings “robots.txt”
• No HTTPS Found • Use less slashes in URL , make
sure design short URL.
• Use protocol HTTPS instead of
HTTP , because HTTPS is more
secure.
POOR OR OUTDATED WEBSITE
DESIGN
• The overall design of a website needs to be both functional
and aesthetically pleasing. Visitors will judge how your
website looks, after all. However, website design trends
change relatively often.
PROBLEM
&
SOLUTION PROBLEM
1. Images That Lack Quality.
2. Using A Marketplace Theme.
3. Improper use of Subdomain & Sub-folder.

SOLUTION
1. Low resolution image is not acceptable. Use high resolution
image.
2. Avoid using pre-designed templates for your e-commerce
page. Its changes look completely.
3. Use Sub-folder instead of Sub-domain , because it provide
more option.
• Sub-folder . www.domain.com/blog.
• Sub-domain .blog.domain.com.
PROBLEMATIC LANDING PAGES
• Landing pages are vital to your ability to convert leads. They
help reiterate the benefits of your offer, keep leads focused,
and guide leads to conversion. If your landing pages are poor,
odds are your conversion rate will be too.
PROBLEM
&
SOLUTION PROBLEM
If your landing pages are poor, odds are your conversion rate will be too.
The following are some of the biggest mistakes you can make when
setting up your landing pages:
SOLUTION
1. MakePage.
1. Landing
A Catch-All sure you create a unique and
2. relevant landing page for every
Missing Calls-To-Action.
3. CTA(Catch
Not Setting Thank You Pages.all landing page).
2. Include a CTA that clearly outlines
what action you want your leads to
take on each specific landing page
you create.
3. When you convert a lead through a
landing page, be sure to thank them.
A thank you page will help your leads
feel appreciated.
Topic:
Types of Software and Applications.
Course: Professional Practices.
Teacher:Hassaan Butt
What is software?
Basically, the software is a form of an extension of a command to a system. You can
encode particular software to act a certain way in a system. Without software in a
system, it would be impossible to run anything on it. Software majorly comes in
many types.
Some Types of Software :
• System Software
• Open Source Software
• Programming Software
• Driver Software
System Software:
System software is essentially software that has come within a system and performs
as a part of it. These are pre-installed in the design, and it is not very easy to remove
them from the system. Software like a debugger or the command prompt is all coded
inside a system. Many of your daily functions on a system are performed by such
system software.
Some Common Examples:
• Operating Systems
• Device Drivers
• Programming Language Translators
Open Source Software:
Open-source software (OSS) is any computer software that's distributed with its
source code available for modification. That means it usually includes a license for
programmers to change the software in any way they choose: They can fix bugs,
improve functions, or adapt the software to suit their own needs.
Some Common Examples:
• Linux
• Mozilla Firefox
• VLC Media Player
Programming Software:
Programming software is the type of software that is not used by end-users. It is not for
you unless, you are a programmer who writes code. Programming software are
programs that are used to write, develop, test, and debug other software, including apps
and system software. Programming software is used by software programmers as
translator programs. They are facilitator software used to translate programming
languages into machine language code. Translators can be compilers, interpreters and
assemblers. You can understand compilers as programs that translate the whole source
code into machine code and execute it.
Some Common Examples:
Programming software examples include the different
programming language editors, debuggers, compilers and IDEs.
Such as:
• Eclipse – a Java language editor
• Coda – programming language editor for Mac
• Notepad++ – an open-source editor for windows
Driver Software:
Driver software can operate and control devices and peripherals plugged into a
computer. Drivers are important because they enable the devices to perform their
designated tasks. Therefore, each device connected with your computer requires at
least one device driver to function.
Some Common Examples:
• Printer Driver
• Mouse Driver
• Network Card
What is Application?
Application is a software that helps the user in completing tasks such as doing online
research, setting an alarm, designing graphics or even playing games. They are used
by the user and are specific in their functionality or tasks and do the job that they are
designed to do. For example, a browser is an application software designed
specifically for browsing the internet or MS Powerpoint is an application used
specifically for making presentations. Application Software or simply apps can also
be referred to as non-essential software as their requirement is highly subjective and
their absence does not affect the functioning of the system.
Some Common Examples:
• MS Word
• Adobe Photoshop
• Google Chrome
Types of Application:
Some Types:
• Multimedia software
• Graphics software
• Web browsers
• Presentation software
Multimedia software:
A multimedia software is software that is capable of playing or
recording audio files or playing or recording video files.
Multimedia comes in many different formats. It can be almost
anything you can hear or see. Examples: Images, music, sound,
videos, records, films, animations, and more. Web pages often
contain multimedia elements of different types and formats.
Multimedia elements (like audio or video) are stored in media files.
If a user want to play or use some type of files, he must need to
install multimedia application software first to make playable.
Some Common Examples:
• Windows Media Player
• GOM Player
• VLC Media Player
Graphics software:
Graphics software, is capable of editing graphics in a multitude of
ways and includes a number of types of software, including paint
programs, illustration and design programs, photo/image editors,
presentation graphics software, animation software, computer
aided design software, and some desktop publishing software.
Graphics software can edit bitmap and vector graphics, and can be
used to design label templates.
Some Common Examples:
• Adobe Photoshop
• Adobe Illustrator
• MS Paint
• Corel Draw
Web Browsers:
A web browser, or simply 'browser,' is an application used to
access and view websites available on internet to gain
information around the globe. A web browser is a computer
software application that enables a person to locate, retrieve,
and display content such as webpages, images, video, as well
as other files on the World Wide Web.
Some Common Examples:
• Google Chrome
• Apple Safari
• Mozilla Firefox
• Microsoft Edge
Presentation Software :
Presentation software is defined as computer programs
designed to allow the user to present information in an
engaging way such as with text, pictures, sound and video.
(OR)
A computer software package used to display information,
normally in the form of a slide show.
Some Common Examples:
• Google Slides
• Slidebean
• Keynote for Mac
• MS PowerPoint
So the Question is…
How to Build a Good
Software or
Application???
So here are some characteristics for building a good
software.
• Correctness
Correctness is important for good software. There shouldn’t
be faults with specification, design or
implementation.
• Usability
Users should be able to learn and use a system easily.
• Efficiency
The less resource a piece of software uses, the better. Processor,
memory and disk space usage should be minimized.
• Reliability
A system that can perform the required functions stably is
So here are some characteristics for building a good
software.
• Adaptability
A system that can be used without modification for different
situations it’s good.
• Accuracy
The accuracy of its outputs is good. This measures if the
software outputs the right results for users.
• Robustness
If a system is still working after getting invalid inputs and stressful
environmental conditions, then it’s good for our system..
• Maintainability
The ease in which an existing system can be changed is
So here are some characteristics for building a good
software.
• Portability
A system that operates in different environments from
which it’s originally designed makes it good.
• Speed
A speedy software shows focus to complete tasks as
demanded.
• Readability
Easy to read code is easy to change code. If we understand them
faster, then we can make changes faster and in a less error way.
• Testability
Making our software system testable is critical. If our code
is easy to write unit tests for, then that’s good.
Information system
Information system

Information system is define as the the software and hardware


that help organize and analyze data

The pupose of an information system is to turn raw data into


useful information that can be used for decision making in an
organization.
Components of information system

. Computer hardware
. Computer software
. Telecommunication
. Databases
. Human resources and procedures
Types of information system

Management information system


Transaction processing system
Decision support system
Office automation system
Data warehouse
Knowledge Management system
Transaction processing system
TPS stand for transaction processing system.

A system that collect that collect stores modifies and retrieves the data
transaction of an enterprise.

Transaction processing system internal and external activities.


Example
Airline reservation system

Electronic transfer of funds

Bank account processing system

Shopping
Management information system

A management information system is an information used for decision


making and the control and analysis of information in an organization .

This system is used to gather information for the organization and


decision
Object of MIS

Data capture
Processing of data
Storage of information
Retrieval of information
Dissemination of information
Decision support system

DSS stand for Decision support system


A decision support system is an information system that support
business or organization decision making activities.
It is a computer based supporting system.
Where is it used?

Budget plaining
Stock market
Medical diagnosis
Example of DSS

GPS route plaining


Microsoft share point workspace
Office automation system
An office automation system in an information system involving the
creation collect collction storage and transmission of office information.

The basic activities of OPS include information storage data exchange


and data management.
Uses of Office automation system
Organization to complete task effectively

Handle the organization document in good way

Project Management
Example of Office automation system
Microsoft office
Envoy
Dialpad
Knowledge Management system
Knowledge management system is both gathering organizing and share
information across an organization.

creation of new knowledge in an organization

Share information
ideas
experience
COPYRIGHT
CONTENTS
• What is Copyright?
• History of Copyright.
• Types of Copyright.
• If There is no Copyright.
• Copyright lasts?
• Copyright Regulations
in Europe.
What is Copyright?
• A copyright is a type of intellectual property that gives its owner the
exclusive right to copy and distribute a creative work, usually for a
limited time. The creative work may be in a literary, artistic,
educational, or musical form.
What can be protected?
Literary Works
Musical Works
Dramatic Works
Choreographic Works
Pictorial and Graphic Works
Motion Pictures and AV
Sound Recordings
Architectural Works
…History…
• A Brief History of Copyright. The world's first copyright law was the
Statute of Anne, enacted in England in 1710. This Act introduced for
the first time the concept of the author of a work being the owner of
its copyright, and laid out fixed terms of protection.
Copyright Law
• The Copyright Law of the United States grants monopoly protection
for "original works of authorship". With the stated purpose to
promote art and culture, copyright law assigns a set of exclusive rights
to authors: to make and sell copies of their works, to create derivative
works, and to perform or display their works publicly.
Types of copyright
• Public Performing Right:
The exclusive right of the copyright
owner, granted by the U.S. Copyright Law, to authorize the
performance or transmission of the work in public.

• Public Performance License:


BMI issues licenses on behalf of the
copyright owner or his agent granting the right to perform the work in,
or transmit the work to, the public.
Types of copyright…
• Reproduction Right:
The exclusive right of the copyright owner, granted by
the Copyright Act, to authorize the reproduction of a musical work as
in a record, cassette or CD.

• Mechanical License:
Harry Fox Agency, Inc. issues licenses on behalf of the
copyright owner or his agent, usually to a record company, granting
the record company the right to reproduce.
TYPES OF COPYRIGHT…
• Synchronization License:
Music Publishers issue licenses as copyright
owner or his agent, usually to a producer, granting the right to
synchronize the musical composition in timed relation with audio-
visual images
If There is no Copyright
• The main motive for creative endeavors (money) disappears. If
authors can’t make a living writing, most will not write. If a record
company can’t profit from a band, they will sign fewer band and cut
loose the money losers.
• If copyright exists but can’t be enforced, the above still happens
eventually. The end result is less creative content and hard to pirate
distribution methods become preferred like print and closed
database.
How long does copyright last?
• A copyright last for life plus 70 years for individuals for anything on or
after 1978.
• A copyright lasts for 95 years for corporate authors after publication
for anything on or after 1978. (It is 120 years after creation if not
published.)
• Works published before 1978 and after 1923 are protected for 95
years.
COPYRIGHT REGULATIONS IN
EUROPE:
TOPIC: INNOVATION AND DIGITAL TRANSFORMATION
AND EXPLAIN ITS
COMPONENT WITH
EXAMPLES.......................................
Innovation is the practical
implementation of ideas that result
in the introduction of new goods or
services or improvement in offering
goods or services. innovation as "a
new or changed entity realizing or
redistributing value Turning an idea
into a solution thats add value from
a customer perspective
DIGITAL TRANSFORMATION
WHAT IS DIGITAL
TRANSFORMATION .....................
Digital transformation (DX) is the adoption of digital technology by a company. Common
goals for its implementation are to improve efficiency, value or innovation.
EXAMPLE
Bringing artificial intelligence into your service organization is a prime example of the
power of digital transformation. AI-powered chatbots that answer simple customer
inquiries serve as a welcoming presence on your website, reducing the time customers
have to wait to reach an agent.
HISTORY OF DIGITAL TRANSFORMATION
DIGITILIZATION
is the process of converting analog information into digital form using an analog-to-digital converter,
such as in an image scanner or for digital audio recordings. As usage of the internet has increased since
the 1990s, the usage of digitization has also increased. Digital transformation, however, is broader than
just the digitization of existing processes. Digital transformation entails considering how products,
processes and organizations can be changed through the use of new, digital technologies. Digital
transformation can be seen as a socio-technical programme Between 2015 and 2021, the number of
academic publications dealing with said digital transformation has approximately doubled yearly, from
during 2015 to 2021.Adopting digital technology can bring benefits to a business,[8][9] however some
company cultures can struggle with the changes required by digital transformation.
IN COVID-19:
in 2021 survey, 55% of European companies stated the COVID-19 pandemic has increased the
demand for digitalization, and 46% of companies reported that they have grown more digital.
[16] Half of these companies anticipate an increase in the usage of digital technologies in the
future, with a greater proportion being companies that have previously used digital technology.
[17][18 ] A lack of digital infrastructure was viewed as a key barrier to investment by 16% of EU
businesses, compared to 5% in the US.[13] In a survey conducted in 2021, 89% of African banks
polled claimed that the COVID-19 pandemic has hastened the digital transformation of their
internal operations.[19]
There are seven key components of an effective digital transformation strategy

• Strategy and Leadership


• Culture Change and Communication
• Optimizing Processes
• Data
• Technologies Team Structure
• Results
• Let’s discuss all these Digital Transformation Strategy components in detail.
....................................................................................
Strategy and Leadership
An effective game plan seems to be the obvious but often overlooked component of a
digital transformation strategy . However, “how and who” formulates the strategy is
what makes it important. A basic strategy along with the fitting technologies can help
you digitize or digitalize your business, but transformation requires the correct mindset
and guidance. Hence, strategy combined with the right leadership is the first and most
crucial component of an effective digital transformation strategy. Visionary leadership
with the correct digital transformation strategy can lead to a better, smoother, more
cost-effective and time-effective plan to transform your business, while keeping your
business’ North Star in mind.
LEADER SHIP QUALITIES
• Purposeful change makers
• Forward looking vision
• Risk-takers and Experimenters
• Striving for partnership
Culture Change and Communication
Be ready for a massive culture shift. Usually, clients and employees of a company are reluctant
towards major changes, which makes it difficult to execute any transformation. Culture is the key
cornerstone of any successful digital transformation program. Hence, it will be helpful if you prepare
your employees for it in advance. Effective communication can help you achieve this. Talk to your
employees about the digital transformation strategy and how it will benefit every stakeholder.
Conduct training sessions with your employees to prepare them beforehand. By showing how
necessary it is to align culture with new initiatives you will be able to prepare your employees ahead
of time.
Form clear training schedules, provide regular updates and be consistent with your efforts to
reassure them. Communicate as much as you can even at the risk of over communication.
Process Optimization
How many times have you found yourself in the middle a task, hoping that you could find a simpler
way to do it?
Every business involves numerous processes and operations which can be transformed to make
workflows smoother and easier. Hence, you must keep business process optimization in your mind
while formulating them digital transformation strategy.
The strategy must ensure business process optimization while meeting the goals set for customers
as well as for the internal team. All interconnected business processes must be covered in the
digital transformation strategy, so that maximum output can be achieved.
Along with business process optimization, you must also make good use of data you have gathered
over the years.
DATA
One of the main reasons behind adopting digital transformation is to
eliminate your business’ pain points for your team as well as your
customers. But how will you know what these pain points are?
Data analysis and integration can help you to identify them. Many times,
people select their preferred technologies before analyzing their data
while creating transformation strategies. This is not how it should work.
If you don’t analyze data, you may know what loopholes(errors) to cover
at your internal team’s end, but you may still miss out on the loopholes
that your customers have to deal with regularly. Data analysis and
circulation of its results can help your team identify the best solutions to
problems, thus lead to drafting a better digital transformation strategy
and making the best of the transformation process.
Technologies to be Implemented:
Identifying fitting technologies for your business is one of the most crucial steps while drafting
the digital transformation strategy. Implementing technologies into your company will require a
lot of financial investment.
Hence, to avoid the need of extra funds, it must be done correctly.
Any effective digital transformation strategy will always include some options along with their
budget requirements in order to make the best decision.
Whether you are dealing with updating legacy systems, application modernization or
implementation of entirely new digital systems, you must find the most fitting technology.
Team Structure
Digital Transformation is not about tools, is about people says Harvard Business Review. Hence structure of the team is a
determining factor delivering outcomes according to your Digital Transformation Strategy. The team structure should be decided
according to the size of your project. Your Digital Transformation Initiative should be well-balanced and must comprise of:
Pack of Leaders: With digital business model in mind and well-thought implementation plan, your team must have an agile
leader as torchbearer who can be Chief Digital Transformation Officer or Chief Digital Officer or Chief Digital Innovation Officer or
Chief Technology Officer or Chief Information Officer etc. for accountability.
Business Ninjas: The core digital experience team are the hands-on practitioners of different technologies and business
verticals. Few designations that come under core digitalization team are Product Managers, Program Managers, Customer
Experience Leaders, Customer Success Engineers, Solution Architects and Senior Managers of Business and Technical teams.
Cast of Coders and Designers (CoDe): Having the proficiency and skills in areas of development, designing, coding and data
science and to provide finesses to the DT program, your team must have contribution from all the stakeholders be it developers,
designers, visualizers, data scientists, AI and ML engineers etc.
RESULT
The results of your company’s digital transformation will be strongly influenced
by the way you outline your digital transformation strategy.
Results will always differ according to the practices you choose and the
technologies you implement.
You must take initial results into account and plan long-term strategies to scale
the digital transformation as well as meet new ends as your business grows.
Your team must be flexible enough to look at the results and undertake
changes if required.
The KPIs help you identify if all your requirements are being met.
Agility is the key to success of your digital transformation strategy. You must
follow the detailed strategy you have formulated, but you must also be open to
changes if it doesn’t work out the way you expected it to work
Presentation

Professional Practices.
Topic:
Difference between cyber ethics and cyber technology
and the phases of Cyber ethics.

Submitted to:
Sir Hassan Mehboob Butt
What is Cyber Ethics ?

• Cybernetics' is the study of moral, legal, and social issues involving cybertechnology.

• It examines the impact that cybertechnology has for our social, legal, and moral systems.

• It also evaluates the social policies and laws that we frame in response to issues generated by the

development and use of cybertechnology.


Cyber Ethics Purposes

1. Privacy:

• The content that is available on the internet should not hurt any moral, emotional, or personal ethics of

individuals.

• Users should have the right to protect any information which they don’t want to share openly.

• Private information like user’s contact details, address, security-related information like bank details,

credit card/debit card details, are all included in basic cyber ethics of user privacy and must not be

breached in any case.


Cyber Ethics Purposes

2. IPR:

• IPR stands for Intellectual Property Rights.

• IPR defines that the owners have the complete right to the content that is posted on the

internet.

• The entire content is solely a belonging of the originator and no individual is allowed to

claim that content published by the original creator as its own.

• Unauthorized distribution of someone else’s work should never be adopted as it’s

ethically incorrect to not give creation and monetary benefits to the creator of the work.
Cyber Ethics Purposes

3. Security:

• Security on the internet is the most basic ethical right that every user must be accessible.

• Users of the internet should feel safe while they surf the net.

• Security, in general means only authorized users to have access to the content on the computer.

• And confidential information is safe, without any risk of loss of information/content.


Cyber Ethics Purposes

4. Accuracy:

• The content available on the internet is accessed by billions of users.

• If there is no reliability of the information that is posted online, then it would mislead the masses.

• Cyber ethics assert the importance of posting content on the internet that is correct in all aspects.

• Users trust the content of the internet and rely heavily on the internet for facts, therefore it is highly needed that

the asked information is correct and reliable.


Why cyber ethics?

Cyber ethics is a more accurate label than computer ethics, which can suggest the study of ethical issues

limited either to:

• computing machines.

• computing professionals.

• Cyber ethics is also more accurate than Internet ethics.

which is limited only to ethical issues affecting computer networks.


Phases Of Cyber Ethics

There are four phases of cyber ethics which are followings.

Phase 1

(1950s and 1960s), One ethical/social question that arose during Phase 1 dealt with the impact of

computing machines as “giant brains” and what that meant for being human. Today, we might associate

these kinds of questions with the field of artificial intelligence (or AI). The following kinds of questions

were introduced in Phase 1:

Can machines think? If so,

should we invent thinking machines?

If machines can be intelligent entities, what does this mean for our sense of self?

What does it mean to be human?


Phases Of Cyber Ethics

Phase 2

(1970s and 1980s), computing machines and communications devices began to converge.

Mainframe computers and personal computers could be linked together via privately owned networks,

which generated three kinds of ethical/social issues:

1) privacy concerns (introduced in Phase 1) were exacerbated because confidential information could

easily be exchanged between networked databases.

2) intellectual property issues emerged because personal computers could easily be used to duplicate and

exchange proprietary software programs.

3) computer crime emerged because “hackers” could break into the computers of large organizations.
Phases Of Cyber Ethics

Phase 3

(1990-present), the availability of Internet access to the general public has increased significantly.

This has been facilitated by the phenomenal growth of the World Wide Web.

The proliferation of Internet- and Web-based technologies in this phase has raised ethical and social

concerns affecting:

• Free speech.

• Anonymity.

• Jurisdiction.

• Trust.
Phases Of Cyber Ethics

Phase 4

(present to near future), “Web 2.0” has made possible the proliferation of social networking sites (SNSs),

such as Facebook and Twitter.

Additional ethical/social concerns associated with Phase IV include controversies that are made possible

by the following kinds of technologies:

autonomous machines and sophisticated robots (used in warfare, transportation, care for the elderly,

etc.);

nanocomputing and nano-scale devices;

artificial agents (including “soft bots”) that act on behalf of humans and corporations;

AI-induced bionic chip implants (that can cause us to question what it means to be human vs. cyborg).
Summary Of Four Phases Of Cyber Ethics
Phase Time Period Technological Features Associated Issues

1 1950s-1960s Stand-alone machines (large mainframe Artificial intelligence (AI),


computers) database privacy ("Big
Brother")
2 1970s-1980s Minicomputers and PCs interconnected via Issues from Phase 1 plus
privately owned networks concerns involving
intellectual property and
software piracy, computer
crime, privacy and the
exchange of records.

3 1990s-Present Internet and World Wide Web Issues from Phases 1 and 2
plus concerns about free
speech, anonymity, legal
jurisdiction, virtual
communities, etc.
4 Present to Convergence of information and communication Issues from Phases 1-3 plus
Near Future technologies with nanotechnology research and concerns about artificial
bioinformatics research, etc. agents ("bots") with
decision-making
capabilities, AI-induced
bionic chip implants, nano
computing, pervasive
computing, etc.
What is Internet Fraud?
Internet fraud involves using online services and software with access
to the internet to defraud or take advantage of victims. The term
"internet fraud" generally covers cybercrime activity that takes place
over the internet or on email, including crimes like identity theft,
phishing, and other hacking activities designed to scam people out of
money.
Types of Internet Fraud

Phishing and spoofing:


Phishing, pronounced and meant in the same way as the word ‘fishing’ in the English language, is a way to fish
sensitive information from people online. Phishing sites use illegitimate maneuvers like mimicking a website in its
look and feel to fool users and skip detection. A phishing website poses as a legitimate institution or entity to fool
people into revealing their sensitive information, like credit card details, bank details, personal details, etc.
This information is, in turn, sold on the black market for a hefty price. Moreover, research has it that most phishing
attempts are conducted over emails. So, if you have also received a credible-looking email calling you to take action
urgently, there is a good possibility that this email would redirect you to a malicious phishing website.

Investment Fraud
The popularity of the internet can be attributed to its ubiquitous nature and also being the budget-friendly
medium. To top it all off, the convenience the web provides is what makes it more desirable. No doubt, investors
were attracted to look for investments online. As soon as investors moved to the internet, fraudsters were quick to
follow. They left no stone unturned to get the investors hooked. From tall and false promises about potential
returns to added benefits for bringing in more clients, they tried all.
These fraudsters either run away with the money or keep adding new conditions for the returns.
Malware
Another prevalent form of online fraud is the malware attack. The word malware is short for
malicious software, which are basically files/programs that are potentially harmful to a computer
or a site. These attacks are quite brutal ones and, in most cases, they could lead to serious loss of
business and reputation for the webmasters.
Malware could be injected either by exploiting a vulnerability on a website or by bypassing its
security by shrewd methods. Some of the common ways a hacker injects malware are with SQLi,
JavaScript injection, malicious code injection, etc.

Credit Card Hacks


As a security company, Astra has seen way too many cases of credit card hacks. One way hackers
execute this is by replacing the original form by a phishing form, which collects the customer’s
credit card info and sells it on the black market. Other times, the payment method is manipulated.
As a result of this, the payment by the customer does not reach the seller, but due to the
manipulation in between, it gets credited to the hacker. For e-commerce, this can be a real cause
for a headache. Normally this kind of hack does not come to light quickly, as the seller remains
clueless unless someone reports a forgery to him.
Identity Theft
People do not shy away from sharing their personal information online. All of this information
can be used maliciously, from small details and personal details like birthdays, anniversaries,
and address to bigger identifiable details such as a driving license, voter’s card, citizen identity
number, etc.

Online Dating Scams


Another typical example of internet fraud targets the plethora of online dating applications and websites.
Hackers focus on these apps to lure victims into sending money and sharing personal data with new love
interests. Scammers typically create fake profiles to interact with users, develop a relationship, slowly build
their trust, create a phony story, and ask the user for financial help.

Lottery Fee Fraud


Another common form of internet fraud is email scams that tell victims they have won the lottery. These scams
will inform recipients that they can only claim their prize after they have paid a small fee.
Lottery fee fraudsters typically craft emails to look and sound believable, which still results in many people
falling for the scam. The scam targets people's dreams of winning massive amounts of money, even though they
may have never purchased a lottery ticket. Furthermore, no legitimate lottery scheme will ask winners to pay to
claim their prize.
safety measures for these internet frauds
1) Be more of a private person online.
Divulging every little detail about you and your life might not be an optimum choice, because bad actors
can take that information and use it to their advantage. So, keep your social media account privacy
settings on the stricter side. Anyway, it's better to be a mystery than an open book.

2) Change passwords often.


The online world is full of lurking bad bots and crawlers. These bad bots try to get past your
website/account’s security. This process, in cybersecurity terms, is known as brute force. A unique
password with upper case letters, lower case letters, numbers, symbols, etc. make for a strong
password. But, you should still make sure to change passwords regularly in the case that they have been
infiltrated.

3) Update software/websites regularly.


Many people overlook this simple task, but just updating your website to the latest versions can reduce
the risks of it getting compromised. Moreover, updates are nothing but mended and patched versions
of the discovered vulnerabilities. Hence, using an outdated version of a website/plugin/theme/software
with a publicly known vulnerability could leave your website in grave danger of being exploited. Always
be prompt with updates.
4) Be wary of unsolicited emails/messages.
The internet is teeming with messages and emails from unknown & unverified senders. Take the
information provided in these unsolicited emails with a grain of salt. They seldom are true and
legitimate.

5) Get a security solution.


If you are a website owner, solidifying your website’s security with a premium security solution is
recommended. A rock-solid firewall, like Astra’s web application firewall, leverages continuous
and comprehensive protection to your website and takes you one step closer to security. Astra
firewall shields your website from SQLi, bad bots, XSS, CSRF, OWASP Top 10 & 100+ other
coming threats. It monitors your website 24*7, and has a pretty easy to manage dashboard.

Clearly, the internet is intertwined in our day-to-day lives. To be honest, we cannot do without it,
so shutting it off completely is not an option. Instead, we need to be more clever than the
scammers. Be aware of their tactics and strive to have a more secure cyberspace.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy